General

  • Target

    document-1566086542.xls

  • Size

    331KB

  • Sample

    201126-l29hjp1p3x

  • MD5

    584abf18e262c248927e5eb11199b8d0

  • SHA1

    ec756e911e589aea57b10ee2400c8db3e7fe5798

  • SHA256

    ada1df231ef79661e2664bb12ad1b99fe478b41ee9af354829e75c5e04e9b8cb

  • SHA512

    4b0597016173ad5b75ac9b7ac1ddac9d3121d2a9eaec4545462c33cdb34512d1d201c4499f7b01fe51cd7a7b45b4aa3434b4b0bd28d419bb94b01f7b38f2f9fa

Score
10/10

Malware Config

Targets

    • Target

      document-1566086542.xls

    • Size

      331KB

    • MD5

      584abf18e262c248927e5eb11199b8d0

    • SHA1

      ec756e911e589aea57b10ee2400c8db3e7fe5798

    • SHA256

      ada1df231ef79661e2664bb12ad1b99fe478b41ee9af354829e75c5e04e9b8cb

    • SHA512

      4b0597016173ad5b75ac9b7ac1ddac9d3121d2a9eaec4545462c33cdb34512d1d201c4499f7b01fe51cd7a7b45b4aa3434b4b0bd28d419bb94b01f7b38f2f9fa

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks