General

  • Target

    76ddd79d0ee84395b6feb5a11b97af610346b95ccd8f4b9a1a2ffd46d3f0e24c

  • Size

    78KB

  • Sample

    220724-1n5w8ahff3

  • MD5

    1f9ff6ff0a0a7398da1cb639107c5f70

  • SHA1

    ee7c0c29ae72eee830a18daa7ee1dfc85b354f40

  • SHA256

    76ddd79d0ee84395b6feb5a11b97af610346b95ccd8f4b9a1a2ffd46d3f0e24c

  • SHA512

    0ec22628ef5f1ee362ca5b939a046e5c3281598344df3d7a9b0a69a7dbda1e7c593fc3ea6945735d21408b4c84a96a5577dabf9a0a08d90ee8b2d010ad51c04f

Score
10/10

Malware Config

Targets

    • Target

      76ddd79d0ee84395b6feb5a11b97af610346b95ccd8f4b9a1a2ffd46d3f0e24c

    • Size

      78KB

    • MD5

      1f9ff6ff0a0a7398da1cb639107c5f70

    • SHA1

      ee7c0c29ae72eee830a18daa7ee1dfc85b354f40

    • SHA256

      76ddd79d0ee84395b6feb5a11b97af610346b95ccd8f4b9a1a2ffd46d3f0e24c

    • SHA512

      0ec22628ef5f1ee362ca5b939a046e5c3281598344df3d7a9b0a69a7dbda1e7c593fc3ea6945735d21408b4c84a96a5577dabf9a0a08d90ee8b2d010ad51c04f

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v6

Tasks