General

  • Target

    137ae3c16f1d6d3e8008e4635bc8ab1f12272e16f6f38dc35c3570ab212c2cd9.doc

  • Size

    108KB

  • Sample

    210310-jb4r6fxzas

  • MD5

    5973ba270e9b5ea57c138245ffc39552

  • SHA1

    049f3aa3fa6f4d575d8a18e7ef51788af1ce2090

  • SHA256

    137ae3c16f1d6d3e8008e4635bc8ab1f12272e16f6f38dc35c3570ab212c2cd9

  • SHA512

    614d94c02a227c58576ae6814a8a08f04acbcf7f5cf0826ff4b5b646d80306d035728107d4423665aa0af7eef35e98a8d7d2aca9a294f1e8a687e1df36cbde79

Score
10/10

Malware Config

Targets

    • Target

      137ae3c16f1d6d3e8008e4635bc8ab1f12272e16f6f38dc35c3570ab212c2cd9.doc

    • Size

      108KB

    • MD5

      5973ba270e9b5ea57c138245ffc39552

    • SHA1

      049f3aa3fa6f4d575d8a18e7ef51788af1ce2090

    • SHA256

      137ae3c16f1d6d3e8008e4635bc8ab1f12272e16f6f38dc35c3570ab212c2cd9

    • SHA512

      614d94c02a227c58576ae6814a8a08f04acbcf7f5cf0826ff4b5b646d80306d035728107d4423665aa0af7eef35e98a8d7d2aca9a294f1e8a687e1df36cbde79

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v6

Tasks