General

  • Target

    bbff2bce7c553d1e11b48a38bfd351f9e715b683171f596751d78ace10782e79_JC.xlsm

  • Size

    163KB

  • Sample

    231013-cv1dbacf46

  • MD5

    a1a45847a65b6b39bce75c35174054f6

  • SHA1

    4ca6d35e97aa05ac5f00468afe82eafd53e87cad

  • SHA256

    bbff2bce7c553d1e11b48a38bfd351f9e715b683171f596751d78ace10782e79

  • SHA512

    94e6730a02496d6cedc1c2be047cb1fa2e00b98dc269620ba6f7bfa077e2d3ab96e63d76606baaef3947fadc5e457669e31a23a556706fa27210244ae52e2195

  • SSDEEP

    3072:VlgkqZrBX6HxU1GoLa7r5rligZBYnJbTS7xNn9JxtLOfa27jwg4q:VlR2rgaGo+/i63ntLwaCjwHq

Score
10/10

Malware Config

Targets

    • Target

      bbff2bce7c553d1e11b48a38bfd351f9e715b683171f596751d78ace10782e79_JC.xlsm

    • Size

      163KB

    • MD5

      a1a45847a65b6b39bce75c35174054f6

    • SHA1

      4ca6d35e97aa05ac5f00468afe82eafd53e87cad

    • SHA256

      bbff2bce7c553d1e11b48a38bfd351f9e715b683171f596751d78ace10782e79

    • SHA512

      94e6730a02496d6cedc1c2be047cb1fa2e00b98dc269620ba6f7bfa077e2d3ab96e63d76606baaef3947fadc5e457669e31a23a556706fa27210244ae52e2195

    • SSDEEP

      3072:VlgkqZrBX6HxU1GoLa7r5rligZBYnJbTS7xNn9JxtLOfa27jwg4q:VlR2rgaGo+/i63ntLwaCjwHq

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks