General

  • Target

    210e71404a32af2f3bcd047e71fff70f

  • Size

    290KB

  • Sample

    230221-vnn1taff39

  • MD5

    210e71404a32af2f3bcd047e71fff70f

  • SHA1

    42651b2ccfec5464ba17a90b346a9e8c9a1cc75e

  • SHA256

    c088cec165636c5c1c29996697cb663baf8ee3c937967ec9b0bf42439bf5b3f8

  • SHA512

    8ef7d76aab51526ef96dc6a541251fe5a68c80b517f116bce89a465881bade97f83365c54cc29ccb29eaf71778313fb573e5229cd6da18bbaac5e7c2110706e1

  • SSDEEP

    3072:M/YqBwVA9lwRB1tqvvDSadXnp0EQZyPECdxpHJ8rfVNDTF/2oLwdxE7gXdNnaWCr:YYqBwVADX371d4LofDClHRenJB

Score
10/10

Malware Config

Targets

    • Target

      210e71404a32af2f3bcd047e71fff70f

    • Size

      290KB

    • MD5

      210e71404a32af2f3bcd047e71fff70f

    • SHA1

      42651b2ccfec5464ba17a90b346a9e8c9a1cc75e

    • SHA256

      c088cec165636c5c1c29996697cb663baf8ee3c937967ec9b0bf42439bf5b3f8

    • SHA512

      8ef7d76aab51526ef96dc6a541251fe5a68c80b517f116bce89a465881bade97f83365c54cc29ccb29eaf71778313fb573e5229cd6da18bbaac5e7c2110706e1

    • SSDEEP

      3072:M/YqBwVA9lwRB1tqvvDSadXnp0EQZyPECdxpHJ8rfVNDTF/2oLwdxE7gXdNnaWCr:YYqBwVADX371d4LofDClHRenJB

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Suspicious Office macro

      Office document equipped with 4.0 macros.

    • Deletes itself

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks