General

  • Target

    e5.one

  • Size

    130KB

  • Sample

    230315-143f2afe68

  • MD5

    988bb80f6edafdc366e89041c6874fbf

  • SHA1

    577e6d8dd0ac07359746148a5a75c8da480df0d7

  • SHA256

    acf8e5db17102daab91b1877be4d52b0fb91728e21919ef14b138051f7d6e1bf

  • SHA512

    e1594f2348f4b169c94d86a3fabcd2e7cebb10e631fcb57c1f0b3dc1b88d5145e0485d39564493dc554abb49d592b19d8ed6aad1a5ac7c733ec9a88abb2431e0

  • SSDEEP

    3072:PrfWMINYf3K19kzCnEEQvSMVnte8ZP1Y6J0cTgG2:d6nInM8TXJ52

Score
10/10

Malware Config

Targets

    • Target

      e5.one

    • Size

      130KB

    • MD5

      988bb80f6edafdc366e89041c6874fbf

    • SHA1

      577e6d8dd0ac07359746148a5a75c8da480df0d7

    • SHA256

      acf8e5db17102daab91b1877be4d52b0fb91728e21919ef14b138051f7d6e1bf

    • SHA512

      e1594f2348f4b169c94d86a3fabcd2e7cebb10e631fcb57c1f0b3dc1b88d5145e0485d39564493dc554abb49d592b19d8ed6aad1a5ac7c733ec9a88abb2431e0

    • SSDEEP

      3072:PrfWMINYf3K19kzCnEEQvSMVnte8ZP1Y6J0cTgG2:d6nInM8TXJ52

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v6

Tasks