General

  • Target

    document.doc

  • Size

    75KB

  • Sample

    230321-qlgrhacd81

  • MD5

    094268e03ab9e2e23f0d24554cb81a1b

  • SHA1

    3ff029fa49f48408e332c6de54d97d8a43513a5a

  • SHA256

    b6585c308bac3649bba3aba216a3be2e76b0593f03a623ed4bd1fa1dde2b1c4f

  • SHA512

    f9868abc757464fd0f3d43969c532558167edcaa8c92a36e987f9ad37370eb7dd0a2e18e7acca00ce20d714ac9f7237f967e3094d3451fb357632ea5c9867635

  • SSDEEP

    1536:7SI96yzqU+4PHxmrwQWVOk5QL7eS6t5W0pyu0z/:uVyjo8fVT0iS2vp1y/

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://m6147keeganpw.info/sp282y/si2s81-19.php?l=rwoq3.dat

Targets

    • Target

      document.doc

    • Size

      75KB

    • MD5

      094268e03ab9e2e23f0d24554cb81a1b

    • SHA1

      3ff029fa49f48408e332c6de54d97d8a43513a5a

    • SHA256

      b6585c308bac3649bba3aba216a3be2e76b0593f03a623ed4bd1fa1dde2b1c4f

    • SHA512

      f9868abc757464fd0f3d43969c532558167edcaa8c92a36e987f9ad37370eb7dd0a2e18e7acca00ce20d714ac9f7237f967e3094d3451fb357632ea5c9867635

    • SSDEEP

      1536:7SI96yzqU+4PHxmrwQWVOk5QL7eS6t5W0pyu0z/:uVyjo8fVT0iS2vp1y/

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks