General

  • Target

    document_E327_Jun_1.js

  • Size

    4KB

  • Sample

    230601-ny5b8aee4y

  • MD5

    c82a6fb5e1a2d37e3cf5ccea1e3366e0

  • SHA1

    335d087ad6e68df2f72b7408ab2c9252fafe7cdd

  • SHA256

    c11be08a9c18bac9ca47837ed4b3485f533fd6e1d86215ae68a47d349befd837

  • SHA512

    6ec31c1510fd94d1dd8a7502a99a9b88558d4322a4ab30adc457959ea48d6854e0dff899331247064baf16eb80531c95a705823765609a4967e145289bb1b024

  • SSDEEP

    96:3KD2pdq9E02355apkhUULZ8urkWhGeFmc8nhWDhHq:3KDadq9E0fkhUcZzrvhGPhWDhHq

Score
10/10

Malware Config

Targets

    • Target

      document_E327_Jun_1.js

    • Size

      4KB

    • MD5

      c82a6fb5e1a2d37e3cf5ccea1e3366e0

    • SHA1

      335d087ad6e68df2f72b7408ab2c9252fafe7cdd

    • SHA256

      c11be08a9c18bac9ca47837ed4b3485f533fd6e1d86215ae68a47d349befd837

    • SHA512

      6ec31c1510fd94d1dd8a7502a99a9b88558d4322a4ab30adc457959ea48d6854e0dff899331247064baf16eb80531c95a705823765609a4967e145289bb1b024

    • SSDEEP

      96:3KD2pdq9E02355apkhUULZ8urkWhGeFmc8nhWDhHq:3KDadq9E0fkhUcZzrvhGPhWDhHq

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks