General

  • Target

    bed1d7ed87b7246e3afd8db3a626871c

  • Size

    18KB

  • Sample

    240310-rl6lasec57

  • MD5

    bed1d7ed87b7246e3afd8db3a626871c

  • SHA1

    6146f86a466e23dd8d34ea557efcb4c1a6593596

  • SHA256

    dc0d73c328595e1daddb2f357c4b8cd24fb6b5b397a3ca90147b8d2b712f0eca

  • SHA512

    f5800bbe2602c7a58b8b57345b3e1fbcabe0bb162feffc7b9af7054be8b96dafdcee014d7cf9cbd1d6874312f720dfd65f0049b8f1ad80f090eb23808b0ced4f

  • SSDEEP

    384:TDRzD7rXTp42328Pt1gMFJ0KUUN+hdcWRmpk:3RzbXNV1rRN+3cWRmpk

Score
10/10

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

https://ggle.io/4FBr

Targets

    • Target

      Payment Advice.docx

    • Size

      10KB

    • MD5

      cf876d4261e9141b8ca7e4b4afddc4b3

    • SHA1

      994f15df29b8a85207a8db033690225c3b1784c4

    • SHA256

      78ace6504e5788bf90b2b06106a519f8096c8b6e0200667c6fb60f6bebe09ef2

    • SHA512

      1238a270ebb9b782dbf9f9f6464422f526c6649ffa84391b7d45430a63f6cd170371eff622f94fc3c6d51e09e91c0929d57a927c40de58331b4df636cdc6850d

    • SSDEEP

      192:ScIMmtPi95kG/bGv7m7sOSxLRmf0krFnuTE3ZZN:SPXIBGv7jOSxLelrFnuIp

    Score
    7/10
    • Abuses OpenXML format to download file from external location

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks