Resubmissions

02-06-2023 13:35

230602-qvz97sbf23 10

02-06-2023 13:33

230602-qtmygsbe97 10

General

  • Target

    document_A614_Jun_2.zip

  • Size

    1KB

  • Sample

    230602-qtmygsbe97

  • MD5

    2fe59c7115b258f111be4777ab0fbd6e

  • SHA1

    0e6c39f865401ff5a62505aa37128c87897111a9

  • SHA256

    e0e130031ddaebb509d8d90a35250a521e074a1d2be5b7d6ff5aad66422a3898

  • SHA512

    1e1943f77c3d0408ac4b242cdcc002720bd7cc208c2e71c4bd87b14ece03b1e62a11aa4a21a8641de9b967b8f661bdf17e9861428e4ef0473b88eaef81734bc2

Score
10/10

Malware Config

Targets

    • Target

      document_A614_Jun_2.js

    • Size

      4KB

    • MD5

      230443f8af047c8b4597903328500b43

    • SHA1

      ce7861a9fca90884c3e34ef99507a59fd636153f

    • SHA256

      c6aab235f1835b6a4ac64c0293f9814c0bac0f5b99e5ae345ad1c1dee5e5c408

    • SHA512

      ca3dec226aedd3fff58daefdc35fa49fd8639cdb9e5f9b8d097799b3a1e5d12230ef85b3d32e249e0066ee0a2345ed6a7019a7bffa8123fd8e0008a9d8d2273d

    • SSDEEP

      96:tt6seA96t3/y/H/CgWn2JUeSVKFmopZ4z2V9:tt6TA96t3/y/H/CB2IVkWz+

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks