General

  • Target

    Adobe Cloud Certificate 259323.wsf

  • Size

    6KB

  • Sample

    230214-r6mc6aeb82

  • MD5

    bdbaca93dbb178b60a7e6376a3a937dc

  • SHA1

    20653b247ee52e148f1a9b7a7727aaad9df886b1

  • SHA256

    9e15f908620f3b62433510250fdf8ecf3020e56ee6e60e3007dbccfa6db1b83f

  • SHA512

    522651ca52ab76c947c27fc1784291714453b187b9b12074b41a9a2cf77bf87372799cc71fa45800b628d938d99fccbad7aa7c678e9ab33a9b0e1df812daf652

  • SSDEEP

    192:H/sHXLDgfGWre61ajlhXpSaY643G0r8AWL:Hk3LhWrY75SaY6SG0qL

Score
10/10

Malware Config

Targets

    • Target

      Adobe Cloud Certificate 259323.wsf

    • Size

      6KB

    • MD5

      bdbaca93dbb178b60a7e6376a3a937dc

    • SHA1

      20653b247ee52e148f1a9b7a7727aaad9df886b1

    • SHA256

      9e15f908620f3b62433510250fdf8ecf3020e56ee6e60e3007dbccfa6db1b83f

    • SHA512

      522651ca52ab76c947c27fc1784291714453b187b9b12074b41a9a2cf77bf87372799cc71fa45800b628d938d99fccbad7aa7c678e9ab33a9b0e1df812daf652

    • SSDEEP

      192:H/sHXLDgfGWre61ajlhXpSaY643G0r8AWL:Hk3LhWrY75SaY6SG0qL

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks