General

  • Target

    fce9fe56e2a1eab6d8a20cd4a35e37696c440f88bb16d1d62d5775bd325be529

  • Size

    48KB

  • Sample

    221126-dnnllsbg9z

  • MD5

    56d15a5e7ef525d8ba3396e93abfd247

  • SHA1

    9ab1e21b5e5e09cdb7ec397f3c247a7e159857c9

  • SHA256

    fce9fe56e2a1eab6d8a20cd4a35e37696c440f88bb16d1d62d5775bd325be529

  • SHA512

    579e4faf6546588166858c9ad7a4475708ec1ef8ca2f338772b3d9441e4a2b6f66c6763f87303e96d70a4a77269750a371521c7538058e69db6ba9268f75b296

  • SSDEEP

    1536:hMkjwLbZz2Paip473qNFwIKPxT4l8gGeTIePpA:ikjybIiiSmwrF4lvGeTIz

Score
10/10

Malware Config

Targets

    • Target

      随州市2014年度考试录用公务员拟录用人员公示名单.xls

    • Size

      148KB

    • MD5

      cf8ef7becb2b29593ddd35a5259b8065

    • SHA1

      7bf378f8f80c0ae5483d441b9a271564659305af

    • SHA256

      27f8893f8755016028b006c82a826f05c5e5186aef972b0fe1487dbac300417c

    • SHA512

      93578e0e665ff15a04e304b04079a8b38a2241d7f7960272950e4dd21576026e4aad0aba9369a25e29bfb75d495419ec8f859e057749a98b42f09a7954c03c74

    • SSDEEP

      1536:/eEoWTJ6dTPnKrMUClgsfO/8Dg4Z956o2lVsxH6liOB3bi+2jcc0lbxOvTgZ/uIv:PlVsxH6liOBT2jcc0lbxOrHISaS2tD

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Deletes itself

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks