General

  • Target

    932a3026efefca95190a3f94749c27e1

  • Size

    10KB

  • Sample

    240205-2degyshgh4

  • MD5

    932a3026efefca95190a3f94749c27e1

  • SHA1

    10509f954d01c8e03fe3fe0b1d382bdc5d4cb6dc

  • SHA256

    0839b03191352bb572972885818bf088cf8ea75d597bf02b7c406585e440f578

  • SHA512

    51a0785fe4952479cba0877f8e855d9967e0f5192eeeae7c4ad2246dbc99c602cf01fa206c341d39969be525e624ba4724398e9b11fa035872a6208d02b097c2

  • SSDEEP

    192:ScIMmtPZG/bEpOD0cgEamWBXpK0ydJb3FgER:SPXEEpOQcNoEP7bl

Score
10/10

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

https://shor-tn.herokuapp.com/Sbj7fNjbC

Targets

    • Target

      932a3026efefca95190a3f94749c27e1

    • Size

      10KB

    • MD5

      932a3026efefca95190a3f94749c27e1

    • SHA1

      10509f954d01c8e03fe3fe0b1d382bdc5d4cb6dc

    • SHA256

      0839b03191352bb572972885818bf088cf8ea75d597bf02b7c406585e440f578

    • SHA512

      51a0785fe4952479cba0877f8e855d9967e0f5192eeeae7c4ad2246dbc99c602cf01fa206c341d39969be525e624ba4724398e9b11fa035872a6208d02b097c2

    • SSDEEP

      192:ScIMmtPZG/bEpOD0cgEamWBXpK0ydJb3FgER:SPXEEpOQcNoEP7bl

    Score
    7/10
    • Abuses OpenXML format to download file from external location

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks