General

  • Target

    03bd9d1615e155c57f9a0dedad00df20.xlsx

  • Size

    171KB

  • Sample

    240101-yf2hqagdhj

  • MD5

    03bd9d1615e155c57f9a0dedad00df20

  • SHA1

    1de2eba7e87da57fe5e1c9c4e042c13018d6aa2b

  • SHA256

    ef6544f318b62ad4c219ca2ebe185772c69c3991bdb82e5a508adcebf12675cb

  • SHA512

    279e71f5d58cf314687d0f3081dada866526e8184cbda829e37fd52c22121f05a4e306e2475b8d4a21c51f7f0ef5c41690bffaa53d9460b5178cb25adddddea2

  • SSDEEP

    3072:oUcIhO3Sfwua25bk2wFaBRXAC/kfpdcvz+OVQaw4+rJDEU/H7DcYtEeG/X:oghmS9RdkRaXl/kxdcvzQFHr5/bDc8G

Score
10/10

Malware Config

Targets

    • Target

      03bd9d1615e155c57f9a0dedad00df20.xlsx

    • Size

      171KB

    • MD5

      03bd9d1615e155c57f9a0dedad00df20

    • SHA1

      1de2eba7e87da57fe5e1c9c4e042c13018d6aa2b

    • SHA256

      ef6544f318b62ad4c219ca2ebe185772c69c3991bdb82e5a508adcebf12675cb

    • SHA512

      279e71f5d58cf314687d0f3081dada866526e8184cbda829e37fd52c22121f05a4e306e2475b8d4a21c51f7f0ef5c41690bffaa53d9460b5178cb25adddddea2

    • SSDEEP

      3072:oUcIhO3Sfwua25bk2wFaBRXAC/kfpdcvz+OVQaw4+rJDEU/H7DcYtEeG/X:oghmS9RdkRaXl/kxdcvzQFHr5/bDc8G

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks