General

  • Target

    official paper 05.21.doc

  • Size

    79KB

  • Sample

    210510-7veql7acre

  • MD5

    120cddd3cd0c40f2141a0d64c4e5f89d

  • SHA1

    8fc9bbc31b81708af3daea7afd67eaac012aa777

  • SHA256

    2650e32484013fba1be1ad1f136be0d18d92eacfc1b25bf8b6d4ed7e389bfa4b

  • SHA512

    66f2e30ea537684007084a0a673577e59603aa9067495a88ef0fb2152b3d1b6e91cf0d31b3b8f4ea547cbd0a42b329addfe78d4ebd1c1814fb4119f76377603f

Score
10/10

Malware Config

Targets

    • Target

      official paper 05.21.doc

    • Size

      79KB

    • MD5

      120cddd3cd0c40f2141a0d64c4e5f89d

    • SHA1

      8fc9bbc31b81708af3daea7afd67eaac012aa777

    • SHA256

      2650e32484013fba1be1ad1f136be0d18d92eacfc1b25bf8b6d4ed7e389bfa4b

    • SHA512

      66f2e30ea537684007084a0a673577e59603aa9067495a88ef0fb2152b3d1b6e91cf0d31b3b8f4ea547cbd0a42b329addfe78d4ebd1c1814fb4119f76377603f

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks