General

  • Target

    290ab891b874c4d86cdebadb01b23218e51043ac2f0927dd508b7210bf0f6111

  • Size

    123KB

  • Sample

    220615-s3k7csdecq

  • MD5

    ff225471c91a15f19a4fd1e9cb09ce66

  • SHA1

    555e4c10c5ad55873cc944af3f9db7357c08290a

  • SHA256

    290ab891b874c4d86cdebadb01b23218e51043ac2f0927dd508b7210bf0f6111

  • SHA512

    12a9238c6bc7f7e90e06e4f9487557e949063cbc02bbdea37475900725ef8052c0c7fb3e33f16f8e97ee76cdbb43e4c5dacf192c29555e218a954b051383a2ad

Score
10/10

Malware Config

Targets

    • Target

      290ab891b874c4d86cdebadb01b23218e51043ac2f0927dd508b7210bf0f6111

    • Size

      123KB

    • MD5

      ff225471c91a15f19a4fd1e9cb09ce66

    • SHA1

      555e4c10c5ad55873cc944af3f9db7357c08290a

    • SHA256

      290ab891b874c4d86cdebadb01b23218e51043ac2f0927dd508b7210bf0f6111

    • SHA512

      12a9238c6bc7f7e90e06e4f9487557e949063cbc02bbdea37475900725ef8052c0c7fb3e33f16f8e97ee76cdbb43e4c5dacf192c29555e218a954b051383a2ad

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v6

Tasks