General

  • Target

    e5d0b1fec288c6857472e9ba7454835d

  • Size

    10KB

  • Sample

    231222-tg24eschfn

  • MD5

    e5d0b1fec288c6857472e9ba7454835d

  • SHA1

    3b06d7fe34ebf870ebb5e6a30de92fb65558bcb9

  • SHA256

    d7d83d05c6cb73a9496da0f77054bd5fa78c8c29b205e786cc318d99c029bb0b

  • SHA512

    70a025caaeecb9afe2f87e2d698e663b4dfb6b06ac3ef30d77832d695dcc8401a9da6399ddde3506971e448575d3866ac0bd1590540662761eb4566c8b3924cd

  • SSDEEP

    192:ScIMmtPi95kG/bGv7m7sOTOX0f0krFnuTE3Zz5b:SPXIBGv7jOTO2lrFnuIDb

Score
10/10

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

https://xs.ke/reY6

Targets

    • Target

      e5d0b1fec288c6857472e9ba7454835d

    • Size

      10KB

    • MD5

      e5d0b1fec288c6857472e9ba7454835d

    • SHA1

      3b06d7fe34ebf870ebb5e6a30de92fb65558bcb9

    • SHA256

      d7d83d05c6cb73a9496da0f77054bd5fa78c8c29b205e786cc318d99c029bb0b

    • SHA512

      70a025caaeecb9afe2f87e2d698e663b4dfb6b06ac3ef30d77832d695dcc8401a9da6399ddde3506971e448575d3866ac0bd1590540662761eb4566c8b3924cd

    • SSDEEP

      192:ScIMmtPi95kG/bGv7m7sOTOX0f0krFnuTE3Zz5b:SPXIBGv7jOTO2lrFnuIDb

    Score
    7/10
    • Abuses OpenXML format to download file from external location

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks