General

  • Target

    sample.ppt

  • Size

    224KB

  • Sample

    210309-w9l3ctldfj

  • MD5

    887fae5b37ce87fa027dfcc8ceea77d4

  • SHA1

    4483e5d6307f0e6e9f6193afba280d1d43d7b271

  • SHA256

    0fddb5b02497d530f81a3904594febfe7e8d39240639a54360b596e531cd91aa

  • SHA512

    910053abe92868e581dc0857db7fc1fefd9331cd3487404b5373a9513ad4b0bffd203d686baf26e01f14451f13254f77d4ca5ad1db3b04fb9e74f800a0388422

Score
10/10

Malware Config

Targets

    • Target

      sample.ppt

    • Size

      224KB

    • MD5

      887fae5b37ce87fa027dfcc8ceea77d4

    • SHA1

      4483e5d6307f0e6e9f6193afba280d1d43d7b271

    • SHA256

      0fddb5b02497d530f81a3904594febfe7e8d39240639a54360b596e531cd91aa

    • SHA512

      910053abe92868e581dc0857db7fc1fefd9331cd3487404b5373a9513ad4b0bffd203d686baf26e01f14451f13254f77d4ca5ad1db3b04fb9e74f800a0388422

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks