General

  • Target

    4aadd3bf071f87781910766f30baa4ebc20d6c26485b21830cee76d4d8eb8b6d.doc

  • Size

    35KB

  • Sample

    240411-bmqngabd5s

  • MD5

    582a41f1e6c7266f4473a396ed841261

  • SHA1

    0ac2b6ceb2ec13575b3b1448e72bc7958841b899

  • SHA256

    4aadd3bf071f87781910766f30baa4ebc20d6c26485b21830cee76d4d8eb8b6d

  • SHA512

    738e804dea2eaf95b4652958a9da042aa64bf39a0bb8a02101fbb9b03bc6867306d466122e96937112cdf11c96139a3a9a2fc82eb1d475be8c4629d4ed3b4b3c

  • SSDEEP

    192:wsWNslLZEvA+6/6r8px8SmvowzxeuQ9iBqyQYYTgN0j8ywc6tAHUkanRasQ:wC8iS8px8SMDen9BCUgN0jw/tgUkanj

Score
10/10

Malware Config

Targets

    • Target

      4aadd3bf071f87781910766f30baa4ebc20d6c26485b21830cee76d4d8eb8b6d.doc

    • Size

      35KB

    • MD5

      582a41f1e6c7266f4473a396ed841261

    • SHA1

      0ac2b6ceb2ec13575b3b1448e72bc7958841b899

    • SHA256

      4aadd3bf071f87781910766f30baa4ebc20d6c26485b21830cee76d4d8eb8b6d

    • SHA512

      738e804dea2eaf95b4652958a9da042aa64bf39a0bb8a02101fbb9b03bc6867306d466122e96937112cdf11c96139a3a9a2fc82eb1d475be8c4629d4ed3b4b3c

    • SSDEEP

      192:wsWNslLZEvA+6/6r8px8SmvowzxeuQ9iBqyQYYTgN0j8ywc6tAHUkanRasQ:wC8iS8px8SMDen9BCUgN0jw/tgUkanj

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks