General

  • Target

    doc_C290_May_30.js

  • Size

    4KB

  • Sample

    230530-3c3zlaca69

  • MD5

    74a50f22f8ff61a021cdad9d514a004c

  • SHA1

    fa0eee1a7507101d122613a157b53f6c52cde3a2

  • SHA256

    13086f0943bc2825c80ba361b64170ad19c10b0db7f11e5abb4d583a2bc806df

  • SHA512

    414a5a75de3c72cab7fbae67eb0d7a521d2bcdb80975e3d8e81aa91baeaaa1c6337a8f9181929fe74eca74079d79225d69b7ce5fd4192140fa55b56bb32de8b2

  • SSDEEP

    96:DHeuFdE7bceTNDtWTHXFV4+PgdnZCsmFwURHQpCSOs:rJFdIb8ItWi

Score
10/10

Malware Config

Targets

    • Target

      doc_C290_May_30.js

    • Size

      4KB

    • MD5

      74a50f22f8ff61a021cdad9d514a004c

    • SHA1

      fa0eee1a7507101d122613a157b53f6c52cde3a2

    • SHA256

      13086f0943bc2825c80ba361b64170ad19c10b0db7f11e5abb4d583a2bc806df

    • SHA512

      414a5a75de3c72cab7fbae67eb0d7a521d2bcdb80975e3d8e81aa91baeaaa1c6337a8f9181929fe74eca74079d79225d69b7ce5fd4192140fa55b56bb32de8b2

    • SSDEEP

      96:DHeuFdE7bceTNDtWTHXFV4+PgdnZCsmFwURHQpCSOs:rJFdIb8ItWi

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks