General

  • Target

    without_payload_53_last.docm

  • Size

    17KB

  • Sample

    221016-x1swmsaaaj

  • MD5

    222f1105d6afa0616812a9d31ee15f51

  • SHA1

    41aa2c08e8e7c035164e64e2ca6e1e883667cde4

  • SHA256

    c08dcfe3c3d90369651a12c984b60a921563f088d275685ff8ed48f199a00ff8

  • SHA512

    dd3940ec27e8d0bbaa65edccaa9f6152259e556278521ce86cbb4b1c33e6a2a6fb9742a735b8d0ac8d9ca34a9cb5a304f5d08cd3383578a7009eaa1d614513f5

  • SSDEEP

    384:Y6R7KDJSyDqxkFAd9pSmYDd3Z4PdVRmGzN3zZFhFIkyIM6Hmfk:JJmSyDDadjS7huVVRmGz5ZFhi7I1f

Score
10/10

Malware Config

Targets

    • Target

      without_payload_53_last.docm

    • Size

      17KB

    • MD5

      222f1105d6afa0616812a9d31ee15f51

    • SHA1

      41aa2c08e8e7c035164e64e2ca6e1e883667cde4

    • SHA256

      c08dcfe3c3d90369651a12c984b60a921563f088d275685ff8ed48f199a00ff8

    • SHA512

      dd3940ec27e8d0bbaa65edccaa9f6152259e556278521ce86cbb4b1c33e6a2a6fb9742a735b8d0ac8d9ca34a9cb5a304f5d08cd3383578a7009eaa1d614513f5

    • SSDEEP

      384:Y6R7KDJSyDqxkFAd9pSmYDd3Z4PdVRmGzN3zZFhFIkyIM6Hmfk:JJmSyDDadjS7huVVRmGz5ZFhi7I1f

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v6

Tasks