General

  • Target

    Payment Advice_GLV913332922.xlsx

  • Size

    1.2MB

  • Sample

    210722-hvsqdd8ra6

  • MD5

    e8e5934ac8c39cedfb38985307ee7b03

  • SHA1

    2e861bf7dfb04fa42b2b7b31d85122c72d035ce6

  • SHA256

    ece4d2f1e91d723320e3c6374fa33aca7d05dc03d9403d91ab8388867d43c46b

  • SHA512

    8361e968d07c483b88fe2751210b6dd9fcf1c056624f8e96c2463f2cb389edd881c35b8d76303893742790c831cb20582e5c3c31e89971934000a960ac084fa1

Score
8/10

Malware Config

Targets

    • Target

      Payment Advice_GLV913332922.xlsx

    • Size

      1.2MB

    • MD5

      e8e5934ac8c39cedfb38985307ee7b03

    • SHA1

      2e861bf7dfb04fa42b2b7b31d85122c72d035ce6

    • SHA256

      ece4d2f1e91d723320e3c6374fa33aca7d05dc03d9403d91ab8388867d43c46b

    • SHA512

      8361e968d07c483b88fe2751210b6dd9fcf1c056624f8e96c2463f2cb389edd881c35b8d76303893742790c831cb20582e5c3c31e89971934000a960ac084fa1

    Score
    8/10
    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks