General

  • Target

    factura.zip

  • Size

    4KB

  • Sample

    240116-wc1e5sggb2

  • MD5

    e109be482e82d1bd14af64d070d2670c

  • SHA1

    30532b7ec2fe340939a18e8f328c17ddfa3276ef

  • SHA256

    df9f9bed6685eeba38defa87a755a0c8120f7b572094368e3aef41829039980d

  • SHA512

    73e5c7c3ac9d4f2c001df51633becf00e745d20df396e25d51a4b06da60993b1420fc21e784843913650533c44b310daeaef94fc8810d59f1b10e3e179fa9573

  • SSDEEP

    96:pJpDQKSK6aetXennFi0A/Txzdxh40jV4/b23r/wF5fyY+zCGiM5oEo7k13e:p0KT6aetHfNz7iMVh/wDfyY+zCGiMPo3

Score
8/10

Malware Config

Targets

    • Target

      factura.doc

    • Size

      11KB

    • MD5

      05c137d8e79ce59ed6e4b7cd78e5b8a2

    • SHA1

      3a41de3774b6a17a34a8bedf1a0881a3f08d492d

    • SHA256

      5a31c77293af2920d7020d5d0236691adcea2c57c2716658ce118a5cba9d4913

    • SHA512

      46551cb4556183b6d5e4fe20e1d2f916c9e50f109f1bec69cc3abce295d1be138c0dadc69ab7a510d4e29e59656b47b1d36a486c1e68d71c776271ff1ef58aa3

    • SSDEEP

      192:TMv9/nrxOgNIVk04Pre4VqPuc+17rf14g/gjXKSDxX8VxrdPJH:Yv9/rsok+Prz1dZKXDsjtJH

    Score
    8/10
    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v13

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks