General

  • Target

    5ab68b65.doc

  • Size

    76KB

  • Sample

    211023-jt7jkadbdl

  • MD5

    8905d28cce510bab99f3f657f87b9adb

  • SHA1

    f3bfb1e935a48465d7e15cac760fb1f40f4bc9f9

  • SHA256

    5ab68b65b38e762409a91c598528eff88fbbfcd0ecd981ab6cbdf938431bf193

  • SHA512

    f043f7ee3d701bedf2e5cf5a4f5e373287202381afd1cae4cb80218ae33f9a4daa401b2bd86a8ae0f444a2834f6dc518b1704a31de0ea723da06a72f9ec7e29c

Score
10/10

Malware Config

Targets

    • Target

      5ab68b65.doc

    • Size

      76KB

    • MD5

      8905d28cce510bab99f3f657f87b9adb

    • SHA1

      f3bfb1e935a48465d7e15cac760fb1f40f4bc9f9

    • SHA256

      5ab68b65b38e762409a91c598528eff88fbbfcd0ecd981ab6cbdf938431bf193

    • SHA512

      f043f7ee3d701bedf2e5cf5a4f5e373287202381afd1cae4cb80218ae33f9a4daa401b2bd86a8ae0f444a2834f6dc518b1704a31de0ea723da06a72f9ec7e29c

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks