General

  • Target

    a5d73c168b845709a0ee66bf2ec04f28

  • Size

    258KB

  • Sample

    240226-jxww8sgf74

  • MD5

    a5d73c168b845709a0ee66bf2ec04f28

  • SHA1

    9c679bc7cef2e5d12cc64f34adf9e10b3e7da0f5

  • SHA256

    3660451767a88435db24c6a55892706fa3c167d5207d78716a13704fc9f2e9ff

  • SHA512

    fe138fd48f1300a9835d04738ee1682f4aa3e9714932de7b186da6ab3ae3ae7243085fe73f18240c3e43a86f20b4801587fa4388fcdb545fff63b500e57ae928

  • SSDEEP

    6144:3k3hbdlylKsgqopeJBWhZFVE+W2NdAF0mW1LVLIlymSgZYdDqvyh1M1cr7z7tPC:X0B1LVLIlLSNDq6hScHta

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Extracted

Language
xlm4.0
Source

Targets

    • Target

      a5d73c168b845709a0ee66bf2ec04f28

    • Size

      258KB

    • MD5

      a5d73c168b845709a0ee66bf2ec04f28

    • SHA1

      9c679bc7cef2e5d12cc64f34adf9e10b3e7da0f5

    • SHA256

      3660451767a88435db24c6a55892706fa3c167d5207d78716a13704fc9f2e9ff

    • SHA512

      fe138fd48f1300a9835d04738ee1682f4aa3e9714932de7b186da6ab3ae3ae7243085fe73f18240c3e43a86f20b4801587fa4388fcdb545fff63b500e57ae928

    • SSDEEP

      6144:3k3hbdlylKsgqopeJBWhZFVE+W2NdAF0mW1LVLIlymSgZYdDqvyh1M1cr7z7tPC:X0B1LVLIlLSNDq6hScHta

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks