General

  • Target

    ea4f55c3e25d39aa2966644bd7a5bc38e93d36438d53d0887215ba34fb024d6c

  • Size

    54KB

  • Sample

    210114-3x8jb5223n

  • MD5

    3a8ab25cbf9309d30743d184145be2ae

  • SHA1

    451a53018f222ad21f98cc3c10b6cf7864ff0537

  • SHA256

    ea4f55c3e25d39aa2966644bd7a5bc38e93d36438d53d0887215ba34fb024d6c

  • SHA512

    d6052095b9fd7a8eaa5638bcc05b2a794050062e1ebe972b793f9d298cd725aa484736df23dd2eac4d5752e53250d3acf976c6f8cca12e75133e14a5b16b6400

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      ea4f55c3e25d39aa2966644bd7a5bc38e93d36438d53d0887215ba34fb024d6c

    • Size

      54KB

    • MD5

      3a8ab25cbf9309d30743d184145be2ae

    • SHA1

      451a53018f222ad21f98cc3c10b6cf7864ff0537

    • SHA256

      ea4f55c3e25d39aa2966644bd7a5bc38e93d36438d53d0887215ba34fb024d6c

    • SHA512

      d6052095b9fd7a8eaa5638bcc05b2a794050062e1ebe972b793f9d298cd725aa484736df23dd2eac4d5752e53250d3acf976c6f8cca12e75133e14a5b16b6400

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v6

Tasks