General

  • Target

    invoice.xlsx

  • Size

    337KB

  • Sample

    211014-fqvh2sgbbl

  • MD5

    a12acac4c8103ba5c02470abcf9adb5a

  • SHA1

    993370b7f329af0bd376e2caeede01527e7ecb13

  • SHA256

    2a4dc0a34285f5c5dc6dbf4196e583135bb4786951d898fda4900f64402df44d

  • SHA512

    993f6a0d7d6cd5f625575ca0735ea2263b21b53f16643338779d5e5699dba1e48e7f8202b5c3c9b39b70cc62bfe78f04cdf86c69bb3aac3bbc9ef64a5af49891

Score
8/10

Malware Config

Targets

    • Target

      invoice.xlsx

    • Size

      337KB

    • MD5

      a12acac4c8103ba5c02470abcf9adb5a

    • SHA1

      993370b7f329af0bd376e2caeede01527e7ecb13

    • SHA256

      2a4dc0a34285f5c5dc6dbf4196e583135bb4786951d898fda4900f64402df44d

    • SHA512

      993f6a0d7d6cd5f625575ca0735ea2263b21b53f16643338779d5e5699dba1e48e7f8202b5c3c9b39b70cc62bfe78f04cdf86c69bb3aac3bbc9ef64a5af49891

    Score
    8/10
    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks