General

  • Target

    Complaint-Copy-418501764-03092021.xls

  • Size

    82KB

  • Sample

    210309-lylhnvtywa

  • MD5

    a0817c869164c4c79a1851b0ecd2a7fd

  • SHA1

    3e4e954b6dd66c108e692ed15ae41f7a013ee9bc

  • SHA256

    2baf07c2fb727691719bbbce005f283e1503848c360b319dbb97a76498a8ea6a

  • SHA512

    6d2755e7fef2fb93d065b9e3117516eef232f056da98de4c8c7675a44dae4c1f0548dcd71ea30c03f0017f1acced6ef6088286ea5c0ebe4fc994c1a8e27bb7b0

Score
10/10

Malware Config

Targets

    • Target

      Complaint-Copy-418501764-03092021.xls

    • Size

      82KB

    • MD5

      a0817c869164c4c79a1851b0ecd2a7fd

    • SHA1

      3e4e954b6dd66c108e692ed15ae41f7a013ee9bc

    • SHA256

      2baf07c2fb727691719bbbce005f283e1503848c360b319dbb97a76498a8ea6a

    • SHA512

      6d2755e7fef2fb93d065b9e3117516eef232f056da98de4c8c7675a44dae4c1f0548dcd71ea30c03f0017f1acced6ef6088286ea5c0ebe4fc994c1a8e27bb7b0

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Suspicious Office macro

      Office document equipped with 4.0 macros.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks