General

  • Target

    remittance details.docx

  • Size

    10KB

  • Sample

    210520-hkpfrpdzae

  • MD5

    68fa428c624f214fd1f4f5613d05f0b3

  • SHA1

    bf2a3e1eaf3a6195e8a593a5b6c6a37bf61e9986

  • SHA256

    a1b230266443fcb32c1e168d8bd522ee1929424a168d11f74fc8608c19b27258

  • SHA512

    0b4fe9a39fb29f442fb170edfdb464292d60a17d12b771fa6ea36b96a17174cdd3bdc48b11eb94279b044e17c3955c392248eb318743fbf47a2f4c5f1eab9ddb

Score
10/10

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

https://is.gd/du7JJm

Targets

    • Target

      remittance details.docx

    • Size

      10KB

    • MD5

      68fa428c624f214fd1f4f5613d05f0b3

    • SHA1

      bf2a3e1eaf3a6195e8a593a5b6c6a37bf61e9986

    • SHA256

      a1b230266443fcb32c1e168d8bd522ee1929424a168d11f74fc8608c19b27258

    • SHA512

      0b4fe9a39fb29f442fb170edfdb464292d60a17d12b771fa6ea36b96a17174cdd3bdc48b11eb94279b044e17c3955c392248eb318743fbf47a2f4c5f1eab9ddb

    Score
    7/10
    • Abuses OpenXML format to download file from external location

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks