General

  • Target

    f24e1c5f138c542807c4d26909a845c22bee47f4b9692fd70ae71805d80f4d57

  • Size

    833KB

  • Sample

    220521-m6zw2agcdk

  • MD5

    0ca8d118f5947686ead6efd744ff4ab0

  • SHA1

    9840206c43887a50af2eaf92c95b7aac28d65067

  • SHA256

    f24e1c5f138c542807c4d26909a845c22bee47f4b9692fd70ae71805d80f4d57

  • SHA512

    69edb48c5bda52fa3ebc0fed3be32301a40a793a4497504e94f362718dc53f43caa81c774f66198763d07535478931a85c58f0e07846c08c8a61df1adabb3fb5

Score
10/10

Malware Config

Targets

    • Target

      Documentation-3638860794.doc

    • Size

      1000KB

    • MD5

      603bebc04d98f9a62b4201c6d46f9ba6

    • SHA1

      345fb60733a9cb98d9ec051ec3d33abf721477fc

    • SHA256

      6655026d703e9efb9805807cb20b7d8284ff91979f5b746c32a965ca1a268ca4

    • SHA512

      917699e9f97a13a18c7a531a1b136816ae95f647d7e41fa6b56f81ac8ff63e6de877c5672977fcbd5d2705e4a17f317c105c0d3a3d7d7b5aaff64930e6ef6aa2

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks