General

  • Target

    d7193571b1e67c3d329668e54fd9438995e9338ca27857ddccac93a46fdda15f

  • Size

    47KB

  • Sample

    221126-dn241abh21

  • MD5

    93b7fdcdd565b30233e20f05073aa810

  • SHA1

    50511d02063a96d817f85372ed12c135f4724b1f

  • SHA256

    d7193571b1e67c3d329668e54fd9438995e9338ca27857ddccac93a46fdda15f

  • SHA512

    87162d36aed76e8710820a1e6dda99df56e635d3ca1d5484ebd34d7655e557d07bd468c136234ca4efb7343f58aca2d4de9ad7131eb5001506d76a8a4fa9f7ca

  • SSDEEP

    768:W+0/lAOCASkMPu6dpxL/+rnl0aW+L3uDJEDdQGXdW2k9YYQmpYG26YOll2:j09AWSVNpt+LKaHLHrk9DyPmc

Score
10/10

Malware Config

Targets

    • Target

      2014ӻڶöʾ.xls

    • Size

      154KB

    • MD5

      fba52be3a68237efed94861936bbe328

    • SHA1

      cba13e94d26972c9c6438eda681bbb42a53f419a

    • SHA256

      e352396a341852856acdeab033e52bc0e1440fe5ee92a9867db2c836f4bf588f

    • SHA512

      6275f12e5d6b60877924d855b85ddde195fea95d098b2a76d68065e054e08792f9c7061561dc5d29acfb0781871c42f854746bc0a4608545ead3f6d088180044

    • SSDEEP

      3072:SeMxwjLk2pR+BFttquNGqiq94w+WwsP22jcc0lbxOKTjXJtXw9q5:/MxwjtL+9f2Q

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Deletes itself

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks