General

  • Target

    doc_C604_May_31.js

  • Size

    4KB

  • Sample

    230531-tgjxvagd3z

  • MD5

    69bb6dccea92cd67d4d00ede99cbe684

  • SHA1

    3e6c99720de035fb52b889b6942386fecf3d2627

  • SHA256

    c32a4139aa0371e89f88db1a78e7ba8c4c32428bd8f228bf02fb55b61e13f601

  • SHA512

    1a5ca09a282a85b58eb7f0e751aa341c8202ace3664503b0fe243f45e1d8c9a0243a3dbe0fc4431ab81171bef835d5e62d5a156d563a008240b50815d9515d5a

  • SSDEEP

    48:s5H94NqzqFFNo2UkkVwRb46mfZmfnmf79Rkc3iKdHeSxFKV34ZjAifofof67KLmO:K4NqzqFFNx9bFMBlFmUAAVSFSsW

Score
10/10

Malware Config

Targets

    • Target

      doc_C604_May_31.js

    • Size

      4KB

    • MD5

      69bb6dccea92cd67d4d00ede99cbe684

    • SHA1

      3e6c99720de035fb52b889b6942386fecf3d2627

    • SHA256

      c32a4139aa0371e89f88db1a78e7ba8c4c32428bd8f228bf02fb55b61e13f601

    • SHA512

      1a5ca09a282a85b58eb7f0e751aa341c8202ace3664503b0fe243f45e1d8c9a0243a3dbe0fc4431ab81171bef835d5e62d5a156d563a008240b50815d9515d5a

    • SSDEEP

      48:s5H94NqzqFFNo2UkkVwRb46mfZmfnmf79Rkc3iKdHeSxFKV34ZjAifofof67KLmO:K4NqzqFFNx9bFMBlFmUAAVSFSsW

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks