General

  • Target

    Документ1.7z

  • Size

    13KB

  • Sample

    230413-kva3esbg3z

  • MD5

    b48872733d9fa90fd86e805bc31fc7c2

  • SHA1

    d19800f6ada48ccb4b0f1deac727d9cab5ce064f

  • SHA256

    54dd233b570ebdb955cb01b44e663c38e67fbaf3047f24b39201d88d17ac3e2b

  • SHA512

    30c54eb8b67e8b529668ac2176954831b954ea53c8a898311b1e8e04cf8926d5cb26fd18602c71d5a3f57973829dfe8c6f217fab6ff269cc1e3611bbca157637

  • SSDEEP

    384:WySoCbrBnVQPszz/FZrnMjkav5sJhHDQ5iXUb:WN4YZLav5sjH05ii

Score
10/10

Malware Config

Targets

    • Target

      Документ1.docx

    • Size

      16KB

    • MD5

      3c9d982926cadcf0e148a05fc7ddad6e

    • SHA1

      0754581247fa5dbe869e6aeb5d9762e86ac3d99b

    • SHA256

      a89287fa99d2d6109cfac2e45382b0069caf92e9a3aefcbcf353086bda765680

    • SHA512

      30b9bb94e3132785d7e2a0c2d7fdea41b80e1a7607912cdc29a278a6287eecdc9e181890f5545b86fdb7ea2ac26b54a598af14363e8e17b8ac2bcb1b15bd613b

    • SSDEEP

      384:doHjdrqCBzXKd/stvfeOcqfNl1/AWN1uxjf:MTm/CfeOXfN//AWkD

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v6

Tasks