General

  • Target

    87edcc5584261e378f752cbbdd9215b07e957a00390fd6ef57095287f7f96361

  • Size

    166KB

  • Sample

    221130-w6m2xadh73

  • MD5

    c84e38763fd674df76b34eca0aa6f00f

  • SHA1

    b439b334ee069b7513fa57bd17511c71b1d7fc02

  • SHA256

    87edcc5584261e378f752cbbdd9215b07e957a00390fd6ef57095287f7f96361

  • SHA512

    839e5e2e963b33ebc1355246289f3e8a429208fe61a80497d94f257a461635a92f942aa6ff4478c2f4522f005eeef4884c9e1abef7a2f182b2be2e83517d2995

  • SSDEEP

    3072:TS1XRJHB2yrlqx1Jxh3Sc7g2QhjsDhroHFNyJkc67dGTZVsaqd:TmXReuGJ3ZsyV8HTOkwZVs1

Score
10/10

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

https://files.catbox.moe/q0yk07.doc

Targets

    • Target

      87edcc5584261e378f752cbbdd9215b07e957a00390fd6ef57095287f7f96361

    • Size

      166KB

    • MD5

      c84e38763fd674df76b34eca0aa6f00f

    • SHA1

      b439b334ee069b7513fa57bd17511c71b1d7fc02

    • SHA256

      87edcc5584261e378f752cbbdd9215b07e957a00390fd6ef57095287f7f96361

    • SHA512

      839e5e2e963b33ebc1355246289f3e8a429208fe61a80497d94f257a461635a92f942aa6ff4478c2f4522f005eeef4884c9e1abef7a2f182b2be2e83517d2995

    • SSDEEP

      3072:TS1XRJHB2yrlqx1Jxh3Sc7g2QhjsDhroHFNyJkc67dGTZVsaqd:TmXReuGJ3ZsyV8HTOkwZVs1

    Score
    7/10
    • Abuses OpenXML format to download file from external location

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Tasks