General

  • Target

    adjure-05.21.doc

  • Size

    79KB

  • Sample

    210505-hjsyn544a6

  • MD5

    9d3b038736642f851c53f64820b753da

  • SHA1

    63380ed79c21eee246839ef585171ae73f3ea4bf

  • SHA256

    8e8af4b21e02cdfc4c9a5ea154e6c0a9ba703aa51c0963208cf28b48c0c1d7ce

  • SHA512

    300c2b6ced1f55a1c7ae4f2ba14ed1609b375887afe330f52b1057999b17a3ebd3036f0c792e7bb62f9621cbfbd21920927842950acfede4272a492892093b1c

Score
10/10

Malware Config

Targets

    • Target

      adjure-05.21.doc

    • Size

      79KB

    • MD5

      9d3b038736642f851c53f64820b753da

    • SHA1

      63380ed79c21eee246839ef585171ae73f3ea4bf

    • SHA256

      8e8af4b21e02cdfc4c9a5ea154e6c0a9ba703aa51c0963208cf28b48c0c1d7ce

    • SHA512

      300c2b6ced1f55a1c7ae4f2ba14ed1609b375887afe330f52b1057999b17a3ebd3036f0c792e7bb62f9621cbfbd21920927842950acfede4272a492892093b1c

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v6

Tasks