General

  • Target

    ba2fb4155e5de91a3180e71f7535757d

  • Size

    110KB

  • Sample

    240308-by8nesbf65

  • MD5

    ba2fb4155e5de91a3180e71f7535757d

  • SHA1

    cde3bc2e199e02f19c551b3084f7674122c9ef19

  • SHA256

    36baae4e17d6c7c294f543016ff2167ef2d2801f5990bf67e6ce54ebfb24a0e8

  • SHA512

    64fc89b7fff597527903865c5e108a09e0032deb3b1c30535bceb7a030c443361093668a574fdda2faa772fe7cd4f9ffa376e73a3bcc324aec86ad9d2034f426

  • SSDEEP

    1536:0hhhnshmKyDj0zn4YhDLS1NYJF5IZ952wxlsiiquOXxidjFs2jcc0lbxOqTgZZxP:zvFZu2jcc0lbxOK+c9JtXwei

Score
10/10

Malware Config

Targets

    • Target

      ba2fb4155e5de91a3180e71f7535757d

    • Size

      110KB

    • MD5

      ba2fb4155e5de91a3180e71f7535757d

    • SHA1

      cde3bc2e199e02f19c551b3084f7674122c9ef19

    • SHA256

      36baae4e17d6c7c294f543016ff2167ef2d2801f5990bf67e6ce54ebfb24a0e8

    • SHA512

      64fc89b7fff597527903865c5e108a09e0032deb3b1c30535bceb7a030c443361093668a574fdda2faa772fe7cd4f9ffa376e73a3bcc324aec86ad9d2034f426

    • SSDEEP

      1536:0hhhnshmKyDj0zn4YhDLS1NYJF5IZ952wxlsiiquOXxidjFs2jcc0lbxOqTgZZxP:zvFZu2jcc0lbxOK+c9JtXwei

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Suspicious Office macro

      Office document equipped with 4.0 macros.

    • Deletes itself

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks