General

  • Target

    invoice_107_2023.doc

  • Size

    5KB

  • Sample

    230531-nw2tbafa7t

  • MD5

    8a40bb6b14682736fe06bd11fb985f26

  • SHA1

    44e58314a51239eeabd15870c142e7ae7179e011

  • SHA256

    3e8138c2e3df4bf31ffd49d89f64916a72c02c612cd080cdec44fdafcae42854

  • SHA512

    d9f6504170a1db91389056bffe6fdabdf366ae0cc7afe819f2a203e3b2c96c4874181b5d34a8778e82d170c190924305291f0e50324a120e5592f38a0e17ef5b

  • SSDEEP

    96:k/lUQKr4IyQRlnbrMmimYUQl+Xa4SW0KImPdwKNKmnpErpjkUW2qr2rg6UCmKR/X:2KQKZvnbg46+K4VOyjKYcd8r/6U6XH

Score
8/10

Malware Config

Targets

    • Target

      invoice_107_2023.doc

    • Size

      5KB

    • MD5

      8a40bb6b14682736fe06bd11fb985f26

    • SHA1

      44e58314a51239eeabd15870c142e7ae7179e011

    • SHA256

      3e8138c2e3df4bf31ffd49d89f64916a72c02c612cd080cdec44fdafcae42854

    • SHA512

      d9f6504170a1db91389056bffe6fdabdf366ae0cc7afe819f2a203e3b2c96c4874181b5d34a8778e82d170c190924305291f0e50324a120e5592f38a0e17ef5b

    • SSDEEP

      96:k/lUQKr4IyQRlnbrMmimYUQl+Xa4SW0KImPdwKNKmnpErpjkUW2qr2rg6UCmKR/X:2KQKZvnbg46+K4VOyjKYcd8r/6U6XH

    Score
    8/10
    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks