General

  • Target

    diagram-421.doc

  • Size

    211KB

  • Sample

    210915-jt6l9sdcal

  • MD5

    b18fc3f3f11abd19d1922b92c05909fb

  • SHA1

    7ae15bd8d40fbdb48e9da25d16ef81efea519227

  • SHA256

    6c6743a28c3168d00c15067c2155823e0f0e54e5cbed41c4ddd9ff3e26952ea3

  • SHA512

    4073ec772a72510579764b917697b376c5ab56004ad3bcb22feaaab1f21fc1f2fce44ff55576592f31deb896bd98188018f4ce015d8f187eebb5dae62d199d07

Score
10/10

Malware Config

Targets

    • Target

      diagram-421.doc

    • Size

      211KB

    • MD5

      b18fc3f3f11abd19d1922b92c05909fb

    • SHA1

      7ae15bd8d40fbdb48e9da25d16ef81efea519227

    • SHA256

      6c6743a28c3168d00c15067c2155823e0f0e54e5cbed41c4ddd9ff3e26952ea3

    • SHA512

      4073ec772a72510579764b917697b376c5ab56004ad3bcb22feaaab1f21fc1f2fce44ff55576592f31deb896bd98188018f4ce015d8f187eebb5dae62d199d07

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks