General

  • Target

    26c90443762f147189330196a7f37a55

  • Size

    83KB

  • Sample

    230214-x7lqxaff69

  • MD5

    26c90443762f147189330196a7f37a55

  • SHA1

    f7f0e47df27cd6c99096ab9f4baeb1041dfe0c41

  • SHA256

    28e0ffe67dd62f679523af17fd8031d2d92a46577effe12f7027c5c5595f8fc5

  • SHA512

    8ae802e9fb065bf8740f33efd1794b28bb98ba3a9b0d78708fa54a4526f90bfe6f4c9f19d17983807bf74c6df0d5c9a6f6a2a9a6b92db692f741291b129944f2

  • SSDEEP

    1536:kU/wRbzYC/DoH//O4Ai4nk4i5gqbxFRWs1yeq3++K8EmA9Z:kUybzY7nHJ4klFTWKy9++K8E

Score
10/10

Malware Config

Targets

    • Target

      26c90443762f147189330196a7f37a55

    • Size

      83KB

    • MD5

      26c90443762f147189330196a7f37a55

    • SHA1

      f7f0e47df27cd6c99096ab9f4baeb1041dfe0c41

    • SHA256

      28e0ffe67dd62f679523af17fd8031d2d92a46577effe12f7027c5c5595f8fc5

    • SHA512

      8ae802e9fb065bf8740f33efd1794b28bb98ba3a9b0d78708fa54a4526f90bfe6f4c9f19d17983807bf74c6df0d5c9a6f6a2a9a6b92db692f741291b129944f2

    • SSDEEP

      1536:kU/wRbzYC/DoH//O4Ai4nk4i5gqbxFRWs1yeq3++K8EmA9Z:kUybzY7nHJ4klFTWKy9++K8E

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Suspicious Office macro

      Office document equipped with 4.0 macros.

    • Deletes itself

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks