General

  • Target

    ovgroup_richiesta.doc

  • Size

    173KB

  • Sample

    220810-mcdrpshadj

  • MD5

    b124e7dab51da1a7b7d69f14c07f3463

  • SHA1

    2defdfa54404868bd0a19b026cd1ef7e067cc2df

  • SHA256

    37c164c74aeee4be30e4ef4ff500251b6d35a87085b58b82b8f1de5364d5abd7

  • SHA512

    5d4a15306f1945802be4fef214a6d0da498c6bdd7a795656215987a33904cb28c3476096846b5bec74e3580dd866d4a87069a2d5546bfd3dd7dc7c772383f616

Score
10/10

Malware Config

Targets

    • Target

      ovgroup_richiesta.doc

    • Size

      173KB

    • MD5

      b124e7dab51da1a7b7d69f14c07f3463

    • SHA1

      2defdfa54404868bd0a19b026cd1ef7e067cc2df

    • SHA256

      37c164c74aeee4be30e4ef4ff500251b6d35a87085b58b82b8f1de5364d5abd7

    • SHA512

      5d4a15306f1945802be4fef214a6d0da498c6bdd7a795656215987a33904cb28c3476096846b5bec74e3580dd866d4a87069a2d5546bfd3dd7dc7c772383f616

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • An obfuscated cmd.exe command-line is typically used to evade detection.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks