General

  • Target

    PO-ENQAQT390230220.docx

  • Size

    10KB

  • Sample

    210614-vqkj4w77qn

  • MD5

    94c6450e05fdd74624431c8c5de8a33a

  • SHA1

    efb090e795788650880a09087e3adb2730cb6b82

  • SHA256

    0dcb15bed090aed6e679e188b87308ae4754bb2f0b91ef8a6089729c54d40dd3

  • SHA512

    3d81e778bb867c608248b0207cccf26d1ce097396b77332c0bc9805c63f97ada3c93e2f0d735aed967097ed9a0e6a9d94be0aab76709d4b18206fd0be9d10e39

Score
10/10

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

http://bit.do/fQ2eT

Targets

    • Target

      PO-ENQAQT390230220.docx

    • Size

      10KB

    • MD5

      94c6450e05fdd74624431c8c5de8a33a

    • SHA1

      efb090e795788650880a09087e3adb2730cb6b82

    • SHA256

      0dcb15bed090aed6e679e188b87308ae4754bb2f0b91ef8a6089729c54d40dd3

    • SHA512

      3d81e778bb867c608248b0207cccf26d1ce097396b77332c0bc9805c63f97ada3c93e2f0d735aed967097ed9a0e6a9d94be0aab76709d4b18206fd0be9d10e39

    Score
    7/10
    • Abuses OpenXML format to download file from external location

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks