General

  • Target

    b40d48738327522cc83e7f75381f73e5

  • Size

    306KB

  • Sample

    240305-hjwhwahg74

  • MD5

    b40d48738327522cc83e7f75381f73e5

  • SHA1

    c9f746b460f554d5f5e4ad61aeae268ea94b66fc

  • SHA256

    bf304c534a5f19a125487f4864bb17ff0c00d2f09e3620c1ab18e637a5ad04cc

  • SHA512

    6a79143227fa90a0bb49025e22d6a12007805b27dd6763b0c18a5d9415fdd940cec35a6ff0c126c6c1ad5304d7874f0e266a24ba626947d5cd6622fa1c435be4

  • SSDEEP

    6144:S8NSLcq+YXEsRp9uvB17fruVRDNsie5rVELDvc8DbEKUacRB:JPYXEsRWr7KVRDmVExP+acRB

Score
10/10

Malware Config

Targets

    • Target

      b40d48738327522cc83e7f75381f73e5

    • Size

      306KB

    • MD5

      b40d48738327522cc83e7f75381f73e5

    • SHA1

      c9f746b460f554d5f5e4ad61aeae268ea94b66fc

    • SHA256

      bf304c534a5f19a125487f4864bb17ff0c00d2f09e3620c1ab18e637a5ad04cc

    • SHA512

      6a79143227fa90a0bb49025e22d6a12007805b27dd6763b0c18a5d9415fdd940cec35a6ff0c126c6c1ad5304d7874f0e266a24ba626947d5cd6622fa1c435be4

    • SSDEEP

      6144:S8NSLcq+YXEsRp9uvB17fruVRDNsie5rVELDvc8DbEKUacRB:JPYXEsRWr7KVRDmVExP+acRB

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks