General

  • Target

    7b1a017438faf8389c27eef81092adb00ea72e21381234e91f3105c381ec66bc

  • Size

    54KB

  • Sample

    210114-mwh4qahn1x

  • MD5

    e8bd90189959163ba8a82220cf3431de

  • SHA1

    03a7074beda911425e58641f108c39dd0baab106

  • SHA256

    7b1a017438faf8389c27eef81092adb00ea72e21381234e91f3105c381ec66bc

  • SHA512

    da82ff3db6ca84a25edb3eecedb2cd2f119aa0757068aed63455a860841b97edc374272c29aa95559bf28b6aa7c49e41f180e3b59a9075883543f7b11b5b2054

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      7b1a017438faf8389c27eef81092adb00ea72e21381234e91f3105c381ec66bc

    • Size

      54KB

    • MD5

      e8bd90189959163ba8a82220cf3431de

    • SHA1

      03a7074beda911425e58641f108c39dd0baab106

    • SHA256

      7b1a017438faf8389c27eef81092adb00ea72e21381234e91f3105c381ec66bc

    • SHA512

      da82ff3db6ca84a25edb3eecedb2cd2f119aa0757068aed63455a860841b97edc374272c29aa95559bf28b6aa7c49e41f180e3b59a9075883543f7b11b5b2054

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v6

Tasks