General

  • Target

    NDA_B290.zip

  • Size

    15KB

  • Sample

    230510-web6bsbc6x

  • MD5

    7d08dd4d65f5a02496e2ba98ff3bd2d8

  • SHA1

    fdede5c4c5ca8d27efcd968854d8c9050a7febbe

  • SHA256

    c0c3a8f60ee4855cdaa2767f605ac8a1b224498991b745ebd893763f6a69c1a0

  • SHA512

    47053ea8c6c4be682e4d05bebf9e5b7b4de9d77286db91b64ba74c4c9b20bdf4fd158e15c699c5eead3ccd4b76c6dc42b4eb3fa952eb4f77197bdc479f0d31f0

  • SSDEEP

    384:UlBAVrk03y3NGy6P35MZJvr1AKBl8iUcEnu0:UrAVYS5y6PixAECitEnu0

Score
10/10

Malware Config

Targets

    • Target

      NDA_B290_May_10.wsf

    • Size

      35KB

    • MD5

      ddf006da73bb161b9108345a281553ce

    • SHA1

      49cd72219c46a39adc4c2628e09861ef66b43577

    • SHA256

      11d4a97656a6ef262273259e5efe67ffb99c471986d4b136da413a3d6584606a

    • SHA512

      773e0e3e476bcb709a214aa1257653d451163feb8071a262c0725aa6686db002cd946f78fe35bc8d98b9acda97b76010f25104c9bde932d5116ed30a8dfa6a12

    • SSDEEP

      768:gDMTaP0P5BhJAuUuF93svjuF9EP0pTkor04PBtlwaf1Y1ZOW2waDmj2kWog:gD2aMdCurGQeMFk3UDmZOHwimj/tg

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks