General

  • Target

    7e527333d4ad7f40ac5c75e58b86ae01

  • Size

    10KB

  • Sample

    240128-3sv9padcg7

  • MD5

    7e527333d4ad7f40ac5c75e58b86ae01

  • SHA1

    3b78e8ed59a6486ac7a418dce979bc244c747fa2

  • SHA256

    457f807839420c14c044df01a7d8b5555429bb168007d28b4738266762fe9109

  • SHA512

    4290d4d6b713b7b580d306358e3480b9038bd4290a58421415ec31bfaa7dd7fe50730c777b575bd1b98688d9b9de89edd7e177b91c5c44c56342b7eaa6b472c2

  • SSDEEP

    192:ScIMmtPi95kG/bGv7m7sOxJf0krFnuTE3KZN:SPXIBGv7jOxNlrFnuIO

Score
10/10

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

https://ggle.io/4FWF

Targets

    • Target

      7e527333d4ad7f40ac5c75e58b86ae01

    • Size

      10KB

    • MD5

      7e527333d4ad7f40ac5c75e58b86ae01

    • SHA1

      3b78e8ed59a6486ac7a418dce979bc244c747fa2

    • SHA256

      457f807839420c14c044df01a7d8b5555429bb168007d28b4738266762fe9109

    • SHA512

      4290d4d6b713b7b580d306358e3480b9038bd4290a58421415ec31bfaa7dd7fe50730c777b575bd1b98688d9b9de89edd7e177b91c5c44c56342b7eaa6b472c2

    • SSDEEP

      192:ScIMmtPi95kG/bGv7m7sOxJf0krFnuTE3KZN:SPXIBGv7jOxNlrFnuIO

    Score
    7/10
    • Abuses OpenXML format to download file from external location

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks