General

  • Target

    TT_COPY.MT103.SWIFT.docx

  • Size

    10KB

  • Sample

    210622-b739863a32

  • MD5

    0af91d7b71322d26388ca7514ac04ec9

  • SHA1

    1589484b4e088060c6d98be0f0722b1073ed5519

  • SHA256

    4ff4f1d31926b86bc3d8bcdb13a445ec7637edd9f4ae48c153262a713c1f72b0

  • SHA512

    f60f19dabde1702615224fa46f992aad77b5e8b3bb5c4a34c826a4bfc8b9f8ca4818820c3926a4094675487f2de842975b7211a649e07fca3ee56464839b79ba

Score
10/10

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

https://win32indexdummy_username@itsssl.com/JmQEk

Targets

    • Target

      TT_COPY.MT103.SWIFT.docx

    • Size

      10KB

    • MD5

      0af91d7b71322d26388ca7514ac04ec9

    • SHA1

      1589484b4e088060c6d98be0f0722b1073ed5519

    • SHA256

      4ff4f1d31926b86bc3d8bcdb13a445ec7637edd9f4ae48c153262a713c1f72b0

    • SHA512

      f60f19dabde1702615224fa46f992aad77b5e8b3bb5c4a34c826a4bfc8b9f8ca4818820c3926a4094675487f2de842975b7211a649e07fca3ee56464839b79ba

    Score
    7/10
    • Abuses OpenXML format to download file from external location

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks