General

  • Target

    ac0acf99bae7503dc348b96f3c2812b2c8808594fb04fad93245240a220861f4.unknown

  • Size

    742B

  • Sample

    240423-b3yzsabb39

  • MD5

    b572f8d51a61a6bef1418446945945b1

  • SHA1

    43c00567c69ab4aecb925532f6d9aa42bad2ffae

  • SHA256

    ac0acf99bae7503dc348b96f3c2812b2c8808594fb04fad93245240a220861f4

  • SHA512

    f25422a3c84a0c860f7392e6bd9f7e0dcdadfac6fd84bb25243c70f6a75039bff73a11174e4061b2a52d36dd83f433e682f8ed5613fade4f6993d354b14afb73

Malware Config

Targets

    • Target

      ac0acf99bae7503dc348b96f3c2812b2c8808594fb04fad93245240a220861f4.unknown

    • Size

      742B

    • MD5

      b572f8d51a61a6bef1418446945945b1

    • SHA1

      43c00567c69ab4aecb925532f6d9aa42bad2ffae

    • SHA256

      ac0acf99bae7503dc348b96f3c2812b2c8808594fb04fad93245240a220861f4

    • SHA512

      f25422a3c84a0c860f7392e6bd9f7e0dcdadfac6fd84bb25243c70f6a75039bff73a11174e4061b2a52d36dd83f433e682f8ed5613fade4f6993d354b14afb73

    • Detected microsoft outlook phishing page

    • Blocklisted process makes network request

    • Drops startup file

    • Legitimate hosting services abused for malware hosting/C2

    • Detected potential entity reuse from brand microsoft.

MITRE ATT&CK Enterprise v15

Tasks