General

  • Target

    payment5001.docx

  • Size

    10KB

  • Sample

    210614-2scyccqjys

  • MD5

    4dfd0caa1bba34d41e02ac53f8d609b9

  • SHA1

    25905cbf4be967205821ee7aa1462afb0bbdc132

  • SHA256

    81fe8f7d3f171aa2065b541d1fca3ac861dcb905a87016f24ff40317f044127e

  • SHA512

    36d59fffdb85163799ffb5e5399e259b13cd2ac30fdbcf7efdf848da253f217d2b7ebef54c8da7d44f939cdf2f22085c6bb051299eabe834254908c32d221ee8

Score
10/10

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

http://91.218.113.67/..-............................--------------------/...................................-.---------------.wbk

Targets

    • Target

      payment5001.docx

    • Size

      10KB

    • MD5

      4dfd0caa1bba34d41e02ac53f8d609b9

    • SHA1

      25905cbf4be967205821ee7aa1462afb0bbdc132

    • SHA256

      81fe8f7d3f171aa2065b541d1fca3ac861dcb905a87016f24ff40317f044127e

    • SHA512

      36d59fffdb85163799ffb5e5399e259b13cd2ac30fdbcf7efdf848da253f217d2b7ebef54c8da7d44f939cdf2f22085c6bb051299eabe834254908c32d221ee8

    Score
    7/10
    • Abuses OpenXML format to download file from external location

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks