General

  • Target

    b629875af272759b7a9e0ca137642b6c

  • Size

    314KB

  • Sample

    240306-br7gsagb97

  • MD5

    b629875af272759b7a9e0ca137642b6c

  • SHA1

    24e0d5ca3a2346fd9407932f968b9d52c9a3a5f5

  • SHA256

    d7c97599d1a764282b372b6ca58a7214138bab7c3192cd4633162f9803bda4eb

  • SHA512

    5859bc620dbbe07819eb333fadbd4be40029fc011c25d7ef744dc03a38d4b5ee20dfec0e78598dbed3da742a65980a81fd5af9fb8786d046533cae915414cdb1

  • SSDEEP

    6144:oQqPamx2DNRXO/J6t/VYfASkKTzZYwPMPFde/Qxx2u+OA+NT5AF:rmgX7ifASkKTzSwkPFduQx0uD+F

Score
10/10

Malware Config

Targets

    • Target

      b629875af272759b7a9e0ca137642b6c

    • Size

      314KB

    • MD5

      b629875af272759b7a9e0ca137642b6c

    • SHA1

      24e0d5ca3a2346fd9407932f968b9d52c9a3a5f5

    • SHA256

      d7c97599d1a764282b372b6ca58a7214138bab7c3192cd4633162f9803bda4eb

    • SHA512

      5859bc620dbbe07819eb333fadbd4be40029fc011c25d7ef744dc03a38d4b5ee20dfec0e78598dbed3da742a65980a81fd5af9fb8786d046533cae915414cdb1

    • SSDEEP

      6144:oQqPamx2DNRXO/J6t/VYfASkKTzZYwPMPFde/Qxx2u+OA+NT5AF:rmgX7ifASkKTzSwkPFduQx0uD+F

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks