General

  • Target

    FIS_Remittance_Advice_ACH26596.xls

  • Size

    234KB

  • Sample

    220810-rdt8asdab5

  • MD5

    e0946a78fc26ca171545392a44be7889

  • SHA1

    072868e101afb93de47fc2b38832f24e8011a1c6

  • SHA256

    33f4cdc87f17fb37ad8b3dd956e90a807dda3c65537bad975de6c0ef287282c1

  • SHA512

    e4b947eb7816971e584438b91c2995c88e395ecc4636421608fc89d48c5c18856ac472ad004ee00d7e3dc45580e6caab1df50c98b7fd120d2d69bb33b7bc9ef7

Score
10/10

Malware Config

Targets

    • Target

      FIS_Remittance_Advice_ACH26596.xls

    • Size

      234KB

    • MD5

      e0946a78fc26ca171545392a44be7889

    • SHA1

      072868e101afb93de47fc2b38832f24e8011a1c6

    • SHA256

      33f4cdc87f17fb37ad8b3dd956e90a807dda3c65537bad975de6c0ef287282c1

    • SHA512

      e4b947eb7816971e584438b91c2995c88e395ecc4636421608fc89d48c5c18856ac472ad004ee00d7e3dc45580e6caab1df50c98b7fd120d2d69bb33b7bc9ef7

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks