Resubmissions

29-05-2020 16:38

200529-p21kba1x7n 10

General

  • Target

    actoday.eml

  • Size

    118KB

  • Sample

    200529-p21kba1x7n

  • MD5

    7b976b5b0f14b8cc95c5a9610ba0a763

  • SHA1

    211b8a069bb8b373a6b51886e5ad72632535b248

  • SHA256

    febbc5ed972af6a662baf6305b758c5230e185d0c92c0731fb67bd29dc76f750

  • SHA512

    783ba6ba02af61a097ea74500f9c557d0cad7c099bd670b95d37b8e51efd596bc363d68ae6f80046ef8b23c754ebf0f272d7d1db49e37c31a4502c35f44ae951

Score
10/10

Malware Config

Targets

    • Target

      require.05.20.doc

    • Size

      72KB

    • MD5

      9f04925d84fc7155683294c713aeeb58

    • SHA1

      95f774a93375a049246ffce99e4c0da5e5ad18a5

    • SHA256

      427a5c15ca89981ea6386e8a262474f80a47f07af10663478b9c7728fc054d54

    • SHA512

      272a5de403ed83f83b0c17f13a2b0919fc8ee5c8b598edda149c6ba4bfdda14a03383dd514e4fe84f7b2c8baaeaf91075407b8c81391a4920d01636431289a0a

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks