General

  • Target

    new title.doc.zip

  • Size

    4.8MB

  • Sample

    210721-2xhacxnlf6

  • MD5

    ae1aedee6f767663808fdacc1085a601

  • SHA1

    2870cdee90572e2e55199af67ff72d1d28c19240

  • SHA256

    8126ad84bf28bd08db71ec3a066bbefdeaf7f3751a182537955b60d21ed0dca9

  • SHA512

    03b4b0b719b0294ec4bb840030a71d6d6fad46ab030461500a8e55ae3afb87c9bb6b9191e882ae436314a9b08fed21615d722309fa2e90f0be64c1d156ac3d53

Score
10/10

Malware Config

Targets

    • Target

      new title.doc

    • Size

      9.3MB

    • MD5

      aaa839e4993c07fdfba45afe8826d6bf

    • SHA1

      3d00bce50c92b31c3d74d20c5451aedc6878a246

    • SHA256

      632cfc71bd4734fdd98e48166a52fbc4a48d43640f3375fd882dd374479bffb1

    • SHA512

      e3bca0a028a39e602b093069fb84a84ff13d7451ebaaf05dc127aa061ae7d096460133a3b8d726adedafd1dd08d09621197bf9e8747ac622bfedd909dec6f3cc

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks