General

  • Target

    doc_E950_May_30.zip

  • Size

    1KB

  • Sample

    230530-rey8msac6t

  • MD5

    8bb0644c9247e0ee51b21e5f3305bda6

  • SHA1

    a206b7577d2ebfc102fd29ee9bb7404d6f443f6b

  • SHA256

    df6fec758cea6ea8caf816a227846d3409045264c1acb49d5f12a0525b9d69be

  • SHA512

    ea22c2479eba5ba021561f67b4afb49aa6335e8db77e14ea17941bc7cb9939af6d26a38184c9ed155c1e40dc3b9b7b20f5c95fc69deefcf308b5290fcee3eef4

Score
10/10

Malware Config

Targets

    • Target

      doc_E951_May_30.js

    • Size

      4KB

    • MD5

      5e2dcc6d7a1df71def41399fff9b98b5

    • SHA1

      a28875566f6102d7bf96fae638976ee8cc900bfe

    • SHA256

      ac8ac0c34b12b67ebf21e8f7bc528462c8e3faef8168288d55c9d020113f8c10

    • SHA512

      65e3386db8ee20a3ed5afeb4c49a01798d7d2224364ec96c34b0fd84af0ac249b0aad2de5df6c3542ec2470eb4178f9ed151f7c2eaa7e981933e753384726494

    • SSDEEP

      96:huOfb5tC7CVXrqujA4d9zdnTCvdFw8H/vz63wN:Zfb5EuhrqujAEdRm

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks