General

  • Target

    tell,010.21.doc

  • Size

    69KB

  • Sample

    211014-vmhgmsaae2

  • MD5

    323747e2d169559c5180e60e8631bec1

  • SHA1

    68b3c0687e9aec590fb605d54e4b548547be4154

  • SHA256

    8c90ad677c661e7a71283c828b3d437d086ff2aad3b78b792769b10a67ce8bd8

  • SHA512

    5a257c2a2580d61e422568055c65ea299992b0c9dc8c3fdb889a0be60659529b947dde4afc0de0e3e45c862b04c5f7fc79910fb05f60fa036cba389d990b35c5

Score
10/10

Malware Config

Targets

    • Target

      tell,010.21.doc

    • Size

      69KB

    • MD5

      323747e2d169559c5180e60e8631bec1

    • SHA1

      68b3c0687e9aec590fb605d54e4b548547be4154

    • SHA256

      8c90ad677c661e7a71283c828b3d437d086ff2aad3b78b792769b10a67ce8bd8

    • SHA512

      5a257c2a2580d61e422568055c65ea299992b0c9dc8c3fdb889a0be60659529b947dde4afc0de0e3e45c862b04c5f7fc79910fb05f60fa036cba389d990b35c5

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks