General

  • Target

    Notice_3_may_2248985.js

  • Size

    317KB

  • Sample

    230504-q89e2acg74

  • MD5

    5a39a8bbb5d45eb5a078d9c54c58f118

  • SHA1

    41b9582b72696d7d1d1b2664b0a9518887bba36a

  • SHA256

    371c52c6d1206fdc9d9b2f665fb6150596f9444896faf44420d4e5d33f1b68a7

  • SHA512

    1eb6561040964d9db87e1d6a18a318de0b3d8aeecc2110cda8dc1e1e05db44e38b14550a22e664becb0552bf94d05ab71a4973595dde2cee66405b5428e00a68

  • SSDEEP

    3072:+7O6uzBncUvgXSiyqgAZN3Q4De7XaGkH04uOU4aWttssRvX+cGdWBCJjQ+4jvjlp:k

Score
10/10

Malware Config

Targets

    • Target

      Notice_3_may_2248985.js

    • Size

      317KB

    • MD5

      5a39a8bbb5d45eb5a078d9c54c58f118

    • SHA1

      41b9582b72696d7d1d1b2664b0a9518887bba36a

    • SHA256

      371c52c6d1206fdc9d9b2f665fb6150596f9444896faf44420d4e5d33f1b68a7

    • SHA512

      1eb6561040964d9db87e1d6a18a318de0b3d8aeecc2110cda8dc1e1e05db44e38b14550a22e664becb0552bf94d05ab71a4973595dde2cee66405b5428e00a68

    • SSDEEP

      3072:+7O6uzBncUvgXSiyqgAZN3Q4De7XaGkH04uOU4aWttssRvX+cGdWBCJjQ+4jvjlp:k

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks