General

  • Target

    15752cd8c684ed807dd5b39ad9c5f777

  • Size

    10KB

  • Sample

    231221-2gebcsgah2

  • MD5

    15752cd8c684ed807dd5b39ad9c5f777

  • SHA1

    05e03ff11983fe01418bec9fcb7cfcae33dab76b

  • SHA256

    eb995518565c998ec3184b27ac4d46a9077ac7c442c7fa2cbb4254074ceb3f94

  • SHA512

    e6df030d1abf65de342c3994299e7e2bd9a17917fa4039a3416ca6b2786921ba4872f2d6767b8f31f051881474c2b99bdf2ea6620475d217be86209fd210893c

  • SSDEEP

    192:ScIMmtPi95kG/bGv7m7sOZcf0krFnuTE38FR:SPXIBGv7jOZelrFnuIc

Score
10/10

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

https://ulnk.in/0PH1L

Targets

    • Target

      15752cd8c684ed807dd5b39ad9c5f777

    • Size

      10KB

    • MD5

      15752cd8c684ed807dd5b39ad9c5f777

    • SHA1

      05e03ff11983fe01418bec9fcb7cfcae33dab76b

    • SHA256

      eb995518565c998ec3184b27ac4d46a9077ac7c442c7fa2cbb4254074ceb3f94

    • SHA512

      e6df030d1abf65de342c3994299e7e2bd9a17917fa4039a3416ca6b2786921ba4872f2d6767b8f31f051881474c2b99bdf2ea6620475d217be86209fd210893c

    • SSDEEP

      192:ScIMmtPi95kG/bGv7m7sOZcf0krFnuTE38FR:SPXIBGv7jOZelrFnuIc

    Score
    7/10
    • Abuses OpenXML format to download file from external location

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks