General

  • Target

    document_D874_Jun_1.zip

  • Size

    1KB

  • Sample

    230601-sv5wssfd4v

  • MD5

    6673a34a64660158686a56f8dcf9a5fb

  • SHA1

    82d506997a3fa6eaa8f52066d4f208d5b4dda2cd

  • SHA256

    16a597b4fb6dd4d55f5c544c3ab6c06aab4711ddeabf71146754a268f9ea48f8

  • SHA512

    5ab70e4a72173da96327e9427e7674a468e1789b2204513826e7f5fc82443708022df507fbb4f05d5d653482d0a0d27c920fffced84a9a452c56aed9334a1250

Score
10/10

Malware Config

Targets

    • Target

      document_D874_Jun_1.js

    • Size

      5KB

    • MD5

      f23b307aa9c2f4e7b12390248b892667

    • SHA1

      97d4f53a0b91e049f7b59785777aa7ab679a52fe

    • SHA256

      69f3aa2db0d3fb0c8bcc2c1a0ff90e4cfb62558eed7cef195c2d5ba0ed18aa8e

    • SHA512

      fc61588a4e8898367f2aef7cbdc91dfce2b0913263687956bf0699906aad75ac6f790f692ae4fae442b4c48941294d24293d18aec8add5947664c9fff6e50f3f

    • SSDEEP

      96:OleiTFtf7yLH4JfO4Jy0ealsvW1vHduGFmS8J+x:JevCYZZHjf2+x

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks