General

  • Target

    AGENCY APPOINTMENT MV APPOLLO MEO 30000MT OF STEEL BARS.docm

  • Size

    14KB

  • Sample

    210311-gczhaenx8e

  • MD5

    a97a1ed3f0ae65d59ff8224543a7daea

  • SHA1

    14e9cc3489b566173ed6e5a9dc0d1d0442066b60

  • SHA256

    7a5e7acc630e80be187a97fba6037caa36056c12e0f11299d6ee55bed6141fe6

  • SHA512

    08ff34debf744c1ad20ef758aaf74fc6ecb4c86ff6b3e3e4d2fde721054a67163750ab774e7ad4bc699dfcbe187a766140cd88b16992bb7979781ab3f09864e3

Score
10/10

Malware Config

Targets

    • Target

      AGENCY APPOINTMENT MV APPOLLO MEO 30000MT OF STEEL BARS.docm

    • Size

      14KB

    • MD5

      a97a1ed3f0ae65d59ff8224543a7daea

    • SHA1

      14e9cc3489b566173ed6e5a9dc0d1d0442066b60

    • SHA256

      7a5e7acc630e80be187a97fba6037caa36056c12e0f11299d6ee55bed6141fe6

    • SHA512

      08ff34debf744c1ad20ef758aaf74fc6ecb4c86ff6b3e3e4d2fde721054a67163750ab774e7ad4bc699dfcbe187a766140cd88b16992bb7979781ab3f09864e3

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v6

Tasks