General

  • Target

    d645df28dd840db7e2f71b060804fcf8.bin

  • Size

    26KB

  • Sample

    230526-b8ywzadc98

  • MD5

    ab54298f506fc25eccc6307dbcd98a7e

  • SHA1

    3e2e46f29407752c056156dbfb71dd511260ee99

  • SHA256

    2f3b107981264e2fc9a6b9cbe577be70006a5fdcf67f9a63147e2f0c19913a98

  • SHA512

    99e4ebb1d9979a372d5b4a2c80a4e9d48ec4ca192be9c2fcaa15f3fcfe095fea94fd0475e40924530cbb142734c59b340e9dc5f5ff9db36582ed643bcd9c2d40

  • SSDEEP

    384:KAkC4VEuqkIzpBlcGNNMZ0BMtrEWP16FHMwDQewobDgnrOShrG6Xfn3EvPC:YOzz1cIBZ41C3wgoo6XH

Score
10/10

Malware Config

Targets

    • Target

      69b3c7e999be1bdbd6c9bebe95102c3a887876c12eb29af9d222c6c2dce340c3.wsf

    • Size

      76KB

    • MD5

      d645df28dd840db7e2f71b060804fcf8

    • SHA1

      cc2d7b5cced759599ac659ff36c4dd272bc4fae6

    • SHA256

      69b3c7e999be1bdbd6c9bebe95102c3a887876c12eb29af9d222c6c2dce340c3

    • SHA512

      8633f11cb4270f99be211ab73296d19f05dae45caee604b4f6d1c146925231843253c0850588d54624df7738f6da1ecc920d513bc9853ec067914e86375a1423

    • SSDEEP

      1536:j3DbJxlPlX3DV0WWjIQlW0WZIYmX3fSLmxlXTJ1ZOVyj/tQlR1ZOVc:Hb7lPpOWfQhW2h36LmV1ZOcj/tQT1ZOe

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks