General

  • Target

    09251fe38ebaed5f4dc381ee06c811f5d78e6e65a60f51d6082d72e8772024ff.doc

  • Size

    36KB

  • Sample

    240426-nza5rsfh46

  • MD5

    a3ea89b61e3bf9a3a27ed3caf6ac26be

  • SHA1

    de6ed557f4cc4da8ae83f89810768b1c3a0714cb

  • SHA256

    09251fe38ebaed5f4dc381ee06c811f5d78e6e65a60f51d6082d72e8772024ff

  • SHA512

    d11a1de6e5a7371fbc682115c76a5c177cbc8a388478a616e9c936638ae8f5c1a8e12f2d4c9c6a8938a0fa6b3977f7db7fb4072a0e0cbb63fd8340bc61b243b3

  • SSDEEP

    768:ilqKCcKBFeSWjKif3y+5Jl7qRpqtfeMZ3VdiiZJYxbBSzDHaA:SRXKBFjWjN/y+5TuWQM9Vdfqbk/aA

Score
10/10

Malware Config

Targets

    • Target

      09251fe38ebaed5f4dc381ee06c811f5d78e6e65a60f51d6082d72e8772024ff.doc

    • Size

      36KB

    • MD5

      a3ea89b61e3bf9a3a27ed3caf6ac26be

    • SHA1

      de6ed557f4cc4da8ae83f89810768b1c3a0714cb

    • SHA256

      09251fe38ebaed5f4dc381ee06c811f5d78e6e65a60f51d6082d72e8772024ff

    • SHA512

      d11a1de6e5a7371fbc682115c76a5c177cbc8a388478a616e9c936638ae8f5c1a8e12f2d4c9c6a8938a0fa6b3977f7db7fb4072a0e0cbb63fd8340bc61b243b3

    • SSDEEP

      768:ilqKCcKBFeSWjKif3y+5Jl7qRpqtfeMZ3VdiiZJYxbBSzDHaA:SRXKBFjWjN/y+5TuWQM9Vdfqbk/aA

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks