General

  • Target

    963a97b6efe44b61e3241b3747028987

  • Size

    238KB

  • Sample

    240212-ew2nwagh6y

  • MD5

    963a97b6efe44b61e3241b3747028987

  • SHA1

    65cc1ec0d4434bbe52d2c8e73943c3f845504f12

  • SHA256

    3e5c3ca2dba4a97b5ce64954a2b4a01b29a140dacfc0401dcc75471545c1f49a

  • SHA512

    649b9ec6872bfab560e1428a97bacd818d9bcc5577d5f73e80dcf83a8145abd8eb11bfcc3d186cc43da4d63df9fdd5ff528d5b33b9287a71b6d1976fff945a3f

  • SSDEEP

    6144:StNSLcq+YXEstmCKKIfVeSrPwqWaswkoWMM:CPYXEszKTwaEoWMM

Score
10/10

Malware Config

Targets

    • Target

      963a97b6efe44b61e3241b3747028987

    • Size

      238KB

    • MD5

      963a97b6efe44b61e3241b3747028987

    • SHA1

      65cc1ec0d4434bbe52d2c8e73943c3f845504f12

    • SHA256

      3e5c3ca2dba4a97b5ce64954a2b4a01b29a140dacfc0401dcc75471545c1f49a

    • SHA512

      649b9ec6872bfab560e1428a97bacd818d9bcc5577d5f73e80dcf83a8145abd8eb11bfcc3d186cc43da4d63df9fdd5ff528d5b33b9287a71b6d1976fff945a3f

    • SSDEEP

      6144:StNSLcq+YXEstmCKKIfVeSrPwqWaswkoWMM:CPYXEszKTwaEoWMM

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks