General

  • Target

    98b04ec2f4fe5067fdd41e4bd4cb4de7

  • Size

    10KB

  • Sample

    240213-g1kl9sce56

  • MD5

    98b04ec2f4fe5067fdd41e4bd4cb4de7

  • SHA1

    ae9251ba328b72682fc604334107a5654d45c2b8

  • SHA256

    9f56f4584e859e5e6d38a9675131cf499d735b1637156da7ad6bd1ce78d6babd

  • SHA512

    43e9af4319324e2872145c89c00748f7dd9d80ab4abfce5e3f12145ca0de6122e1cc9354d461007849af96a1a1ebf77fffed75cba717aa54012b96317e775c7d

  • SSDEEP

    192:ScIMmtPZG/bEpOVYgEamWBXpK0ydJb3FNwR:SPXEEpOVYNoEP7bo

Score
10/10

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

https://upurl.me/2ggwo

Targets

    • Target

      98b04ec2f4fe5067fdd41e4bd4cb4de7

    • Size

      10KB

    • MD5

      98b04ec2f4fe5067fdd41e4bd4cb4de7

    • SHA1

      ae9251ba328b72682fc604334107a5654d45c2b8

    • SHA256

      9f56f4584e859e5e6d38a9675131cf499d735b1637156da7ad6bd1ce78d6babd

    • SHA512

      43e9af4319324e2872145c89c00748f7dd9d80ab4abfce5e3f12145ca0de6122e1cc9354d461007849af96a1a1ebf77fffed75cba717aa54012b96317e775c7d

    • SSDEEP

      192:ScIMmtPZG/bEpOVYgEamWBXpK0ydJb3FNwR:SPXEEpOVYNoEP7bo

    Score
    7/10
    • Abuses OpenXML format to download file from external location

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks