General

  • Target

    products.doc

  • Size

    20KB

  • Sample

    211125-vgb3nsfhcl

  • MD5

    face9e915f72fc9bd471c78833e10ac8

  • SHA1

    3afcfa8e148d76f197b0e42b847270310ed9189e

  • SHA256

    bce02771b259e3e081be3abacf83967fb6e6f217737fae0c25a541c4a868f186

  • SHA512

    f870fe5d9704c98dfc552910677cb7a53394a988734bda739f75425076596b9de98e46b3e39ee036df072b9434065338c7b31e44f4aa8ce9422d295e876d20cc

Score
8/10

Malware Config

Targets

    • Target

      products.doc

    • Size

      20KB

    • MD5

      face9e915f72fc9bd471c78833e10ac8

    • SHA1

      3afcfa8e148d76f197b0e42b847270310ed9189e

    • SHA256

      bce02771b259e3e081be3abacf83967fb6e6f217737fae0c25a541c4a868f186

    • SHA512

      f870fe5d9704c98dfc552910677cb7a53394a988734bda739f75425076596b9de98e46b3e39ee036df072b9434065338c7b31e44f4aa8ce9422d295e876d20cc

    Score
    8/10
    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks