General
-
Target
PO_723_057_35.xls
-
Size
342KB
-
Sample
210415-yq44wm2vx6
-
MD5
f264b8c58febaa3f3eea9a8c83c78cbf
-
SHA1
36010881f4c3e15878bb3d5e76bc443d82827ebe
-
SHA256
db66b26d04c77e03bbf22957af34ba2b5817c397036ab8d4b7c222ec1b1ff40e
-
SHA512
a60be6e617f2704c3dfdc7bcc06e2426f5c52e56da447c92c94e1ce3d118c27b0ef180845557abf3c1d6a63de4f85b93c11eac06bb7bc51c17934406c797f912
Static task
static1
Behavioral task
behavioral1
Sample
PO_723_057_35.xls
Resource
win7v20210408
Behavioral task
behavioral2
Sample
PO_723_057_35.xls
Resource
win10v20210410
Malware Config
Targets
-
-
Target
PO_723_057_35.xls
-
Size
342KB
-
MD5
f264b8c58febaa3f3eea9a8c83c78cbf
-
SHA1
36010881f4c3e15878bb3d5e76bc443d82827ebe
-
SHA256
db66b26d04c77e03bbf22957af34ba2b5817c397036ab8d4b7c222ec1b1ff40e
-
SHA512
a60be6e617f2704c3dfdc7bcc06e2426f5c52e56da447c92c94e1ce3d118c27b0ef180845557abf3c1d6a63de4f85b93c11eac06bb7bc51c17934406c797f912
Score8/10-
Blocklisted process makes network request
-
Drops file in System32 directory
-
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation