General

  • Target

    TEPO0015922.doc

  • Size

    242KB

  • Sample

    230317-kl2h1sfb85

  • MD5

    364dc6c0e8a18b796aa535516d04cb53

  • SHA1

    da1e74c37691d9fd57eb2e73ef89b3aacbaa23d2

  • SHA256

    dd6f2ad2370d52c77db8f3659c116f15c1897e2528694fe9f046be45928a2608

  • SHA512

    f2efd5cb38e6474c83268e7454e268eee06f342cb5b55575a94a3cd206bf7096a8a4ca72a89f88e35668d8d4e39243ef5c2f097f438dd7a7c09716c2d4c3a1c0

  • SSDEEP

    1536:i1iO8Lcs5Kpn0Ws/zhiordTpM6DiJW3BPLN4rZVzFz76mAg5eeVhMDw5wfL8:i+5xdXGVzFtr5RDAw5wfY

Score
10/10

Malware Config

Targets

    • Target

      TEPO0015922.doc

    • Size

      242KB

    • MD5

      364dc6c0e8a18b796aa535516d04cb53

    • SHA1

      da1e74c37691d9fd57eb2e73ef89b3aacbaa23d2

    • SHA256

      dd6f2ad2370d52c77db8f3659c116f15c1897e2528694fe9f046be45928a2608

    • SHA512

      f2efd5cb38e6474c83268e7454e268eee06f342cb5b55575a94a3cd206bf7096a8a4ca72a89f88e35668d8d4e39243ef5c2f097f438dd7a7c09716c2d4c3a1c0

    • SSDEEP

      1536:i1iO8Lcs5Kpn0Ws/zhiordTpM6DiJW3BPLN4rZVzFz76mAg5eeVhMDw5wfL8:i+5xdXGVzFtr5RDAw5wfY

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v6

Tasks