General

  • Target

    04f1ff14b9c99537ff9c7eb9a424e03c

  • Size

    28KB

  • Sample

    221004-x11lgsccgr

  • MD5

    04f1ff14b9c99537ff9c7eb9a424e03c

  • SHA1

    c8d01a06039b83b83f16f506caf8f8c5ad9f294d

  • SHA256

    7e1ac216ac17a1f5314c06daad725cd507eb7bcddad5a568592282dac3380e21

  • SHA512

    afc75bb85198d92d6f2c1a39b000209f3368bf5ef3b6231b15d6e528d4279a2cbd8a2ef25f322680288a92b207dd933d713d519cd0363a5908c65265ac72171e

  • SSDEEP

    768:4dfpQMdoIaqh0DnwtnLd5hFjDXw/p+gkM9G:4WqAknLPDAEgk+G

Score
10/10

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

http://document_doc@1806450061/uuUASDbjasduhuasduyuASHUDHUSADHUASDU/7jhjjhjhjhhggftftftftftftf.doc

Targets

    • Target

      Oct PO.docx

    • Size

      10KB

    • MD5

      87d4fc7bfdbc5302d9c6986670f21b83

    • SHA1

      a3cd5021fd0987fa1acdb9d3ef996f9930fae76c

    • SHA256

      33dd6fafc72e99fd3b04543f51557c1fce75ad1af14deee757c561ccce208b75

    • SHA512

      ea6ec2c36e9172ec969f210589fb3ce99029a4b9d047b049f134609bf8c7996d94d70d444e807480613d94a80e1a58d678302623c467a7936a0f5df60b588248

    • SSDEEP

      192:ScIMmtPYqPC7UpG/bkpbJNOzGdrdlJFtGxV32RgDp:SPXgqPCfIJNOzEjJFtGxx2RI

    Score
    8/10
    • Blocklisted process makes network request

    • Abuses OpenXML format to download file from external location

MITRE ATT&CK Enterprise v6

Tasks