General

  • Target

    20240105_1_Kaunas_Doc.zip

  • Size

    56KB

  • Sample

    240111-vtnx1adcb2

  • MD5

    af0f55905d83ede5af7ee6981530b8fe

  • SHA1

    63ee7be703e635d2f42d7d4c2e40378d8d2beda6

  • SHA256

    e1f52a1a824246b2dbe89b298429b3f9cdd81837539db4de5ebfeaa7aed63f6b

  • SHA512

    83b2d478eb6c1b0efa20751a2220670bbde558eb018299ff1454193bc31293ea30ce9d0b71558649c3a60d44020d6231c1c63c31e7ac5a6154cc560eb26870e2

  • SSDEEP

    1536:bwCIQ/Mo3cs4gIDOSDGC16lZvnTqF2zWc:bqQko3cGIUi6lhuQj

Score
10/10

Malware Config

Targets

    • Target

      f98378693c86be4888f68b688c9733596a01dc55dc9f8600b4bb8d29f2477fd6

    • Size

      164KB

    • MD5

      a0fc6a9cd8d1c92d498bab95210dcaac

    • SHA1

      16672d9c4087fb461f6250693c204610b9eed45a

    • SHA256

      f98378693c86be4888f68b688c9733596a01dc55dc9f8600b4bb8d29f2477fd6

    • SHA512

      dd4d15024c291128a35c144817d6cf0ca8a70d933aab339deb3e693d7b52a0b986a116a8a1eb56d1f11754dd51209ec7f607b00cdb1f23c2fe115df83f027639

    • SSDEEP

      1536:GKAhnh0mRsh+a9f6Dvn1Uj5nlKaYxgQ4BLwof45:1Ahnh0mRBgDBLwow

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix

Tasks