General

  • Target

    20abc82c_by_Libranalysis

  • Size

    39KB

  • Sample

    210512-632ksp2yke

  • MD5

    20abc82cd5e361cbbe4edec371539776

  • SHA1

    b303a9f031a2a9936328333c5f95ba25b7d869a3

  • SHA256

    d92ebf6aa709e0b057754ad6ace896f899a4e38948cb9cad1474f1cdbca61035

  • SHA512

    2f29416584ed3d2e711db2f948d5d65cb01669916aa253379bed805740208fbed0ac936363e7c347ab2e5f4eae8595e09899d977692b44e5dc7a46d2870a3ac8

Score
10/10

Malware Config

Targets

    • Target

      3cdbae46394cd70b74ec9969b270f223ae78f770013cbec0839935eb28a08b5d

    • Size

      46KB

    • MD5

      344d2afca5777152574ebe8cb649dfdb

    • SHA1

      0a03be8ab6013f35a26640bfda308c3a942f870e

    • SHA256

      3cdbae46394cd70b74ec9969b270f223ae78f770013cbec0839935eb28a08b5d

    • SHA512

      f4f408b05590bf603ac7a736f86c66f4a5b6ee37375596ce6023276c7d72bc500f34ca43a3292e123948c6f4fde3f33657c2919c1605e2153b5341afa992e709

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v6

Tasks