General

  • Target

    sample.doc.zip

  • Size

    20KB

  • Sample

    240508-v2h2qafa9z

  • MD5

    16350ba498a0109c503019f5908d7496

  • SHA1

    7e643aa80df9a47eb32e0e24cc3799136f4d01a4

  • SHA256

    a4f19c72cd595cc92f4669ebd5dc026506ff8d5c7e5260635c1beb1d6d65ff3e

  • SHA512

    92d4f4d3198a45ce6852488cc99ffbcb4028619d289b23f6259a84a172c4405a1b2448e44cf238847ddc74c4ad6bbaa70e2e02fcdb4ffb047044c70dbe690a92

  • SSDEEP

    384:fZYhcralCJkFhOlKhYZGQT6tR0Q6ab2KoWAxrNg8A022/7Cxsygk3W4Gz7xn:S+mlCJkFu0iTqRfBbFGr8037IrrM/5

Score
10/10

Malware Config

Targets

    • Target

      7fb4306a36b61be977dfc6f56443542c9d70273bb97b55d5049cd86608aa0f68.doc

    • Size

      70KB

    • MD5

      1812b0ee6924f6188269c65494e580e8

    • SHA1

      fc83f1d3acb53009cbaa7b9df57676274fc561a1

    • SHA256

      7fb4306a36b61be977dfc6f56443542c9d70273bb97b55d5049cd86608aa0f68

    • SHA512

      5432bbe2f3f54a1ddf8980ad1f34a684d0e7b17bd29cc059c3c20e798dfcab025d68a0b46776630c64b84c062a146e27c2f75f8de57e08f88b1ac8cfed1f8eff

    • SSDEEP

      768:Dpwxw+tCmFeFahP8nmwyd04aCF+Fas0Mxw+tq:DSxrtCmFeFahP81CF+FasZxrt

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks