General

  • Target

    bcf5c2e4dbe13907ee644750299bb517

  • Size

    10KB

  • Sample

    240309-2by4ksda7t

  • MD5

    bcf5c2e4dbe13907ee644750299bb517

  • SHA1

    c8d058358cda52e1c46a9d1a8921bde0a52cd44d

  • SHA256

    c48ecc6c77b6efe68318134bdbae47113d4a3f4fcf2edb2b0701e3fdc08250c1

  • SHA512

    c12f807d9d08812d41fbd6baa5de0dcdb0a90d8bd96cd88256bb4ef31b55269a142184cf5361eb9e4b2b73bd0df9fe7efdbe700f890f99622ef552fad8a18adb

  • SSDEEP

    192:ScIMmtPVG/bD1YafOO8o1gb5SEzBC4vNqW603Tp:SPX4D1YLO8sKhlqat

Score
10/10

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

https://upurl.me/iebp8

Targets

    • Target

      bcf5c2e4dbe13907ee644750299bb517

    • Size

      10KB

    • MD5

      bcf5c2e4dbe13907ee644750299bb517

    • SHA1

      c8d058358cda52e1c46a9d1a8921bde0a52cd44d

    • SHA256

      c48ecc6c77b6efe68318134bdbae47113d4a3f4fcf2edb2b0701e3fdc08250c1

    • SHA512

      c12f807d9d08812d41fbd6baa5de0dcdb0a90d8bd96cd88256bb4ef31b55269a142184cf5361eb9e4b2b73bd0df9fe7efdbe700f890f99622ef552fad8a18adb

    • SSDEEP

      192:ScIMmtPVG/bD1YafOO8o1gb5SEzBC4vNqW603Tp:SPX4D1YLO8sKhlqat

    Score
    7/10
    • Abuses OpenXML format to download file from external location

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks