Resubmissions

25/04/2023, 16:32

230425-t12xrsdd5t 10

General

  • Target

    Claim_C856.wsf

  • Size

    95KB

  • Sample

    230425-t12xrsdd5t

  • MD5

    b9803ab344fda06c35564abc686e41ca

  • SHA1

    af3ed285c5359919d1470134264be7d546f9a02f

  • SHA256

    31a7f78871a4d57dadfdaba00a77436f395619ee49084bac4fd3e57b2d306087

  • SHA512

    b8b748eb4c003aeda928f8e5118e6bdb07c635efd7b17047a9c0183c83a22fb8beee6a7e427eeda950e6bab2e5e867978e100c90ae77cb6a15afe24e4410bafc

  • SSDEEP

    1536:63DbXLN16gq3NlDhxN16gJcN16giU9IZTb0GW741rtr8wsr+BFa7z8hiKtlDJK9I:qbXLNFq3NlDHNFJcNFiU9Ix0LEOwsSBX

Score
10/10

Malware Config

Targets

    • Target

      Claim_C856.wsf

    • Size

      95KB

    • MD5

      b9803ab344fda06c35564abc686e41ca

    • SHA1

      af3ed285c5359919d1470134264be7d546f9a02f

    • SHA256

      31a7f78871a4d57dadfdaba00a77436f395619ee49084bac4fd3e57b2d306087

    • SHA512

      b8b748eb4c003aeda928f8e5118e6bdb07c635efd7b17047a9c0183c83a22fb8beee6a7e427eeda950e6bab2e5e867978e100c90ae77cb6a15afe24e4410bafc

    • SSDEEP

      1536:63DbXLN16gq3NlDhxN16gJcN16giU9IZTb0GW741rtr8wsr+BFa7z8hiKtlDJK9I:qbXLNFq3NlDHNFJcNFiU9Ix0LEOwsSBX

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks