General

  • Target

    a1e8645fb3c3c69c56173e9348c10c51

  • Size

    10KB

  • Sample

    240224-p5hbpsda2x

  • MD5

    a1e8645fb3c3c69c56173e9348c10c51

  • SHA1

    0d2043cc21272754db8d541d485f74a69120ae68

  • SHA256

    70071a594284be3aef1916090c8c65d4c84e80ed2ec465817a3dcef53be06970

  • SHA512

    75ec1db9cf587043fac7ed3750338abbc1f3174e68479f15a6c86a57e8d6506d86501f8a8ef3977db67b450807afb94fe2721c840522132e858af28fca9a98ea

  • SSDEEP

    192:ScIMmtPVG/bD1YafOO/gb5SEzBC4vNqW603Tp:SPX4D1YLO/Khlqat

Score
10/10

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

https://upurl.me/1e1c9

Targets

    • Target

      a1e8645fb3c3c69c56173e9348c10c51

    • Size

      10KB

    • MD5

      a1e8645fb3c3c69c56173e9348c10c51

    • SHA1

      0d2043cc21272754db8d541d485f74a69120ae68

    • SHA256

      70071a594284be3aef1916090c8c65d4c84e80ed2ec465817a3dcef53be06970

    • SHA512

      75ec1db9cf587043fac7ed3750338abbc1f3174e68479f15a6c86a57e8d6506d86501f8a8ef3977db67b450807afb94fe2721c840522132e858af28fca9a98ea

    • SSDEEP

      192:ScIMmtPVG/bD1YafOO/gb5SEzBC4vNqW603Tp:SPX4D1YLO/Khlqat

    Score
    7/10
    • Abuses OpenXML format to download file from external location

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks