General

  • Target

    58409c52b6d493a27570b98e64227437976eb48d9623bcbb5262f388501c388c

  • Size

    134KB

  • Sample

    240515-c7j7vsde21

  • MD5

    f8fe981dcc793142ed8466f2735bc7e5

  • SHA1

    8e52ec5bab7327b2f42133a4ca292ec266edec05

  • SHA256

    58409c52b6d493a27570b98e64227437976eb48d9623bcbb5262f388501c388c

  • SHA512

    15a4936961fd1ae4f0b0a5ba42a3b35a9d35c2e61ec3363104b81df4278c5f5d727f61fb4d6d70c1339e0e728054121e6f61d77bbecf9476fc0d41c26583633e

  • SSDEEP

    3072:W2Q+A64l7VX1TnRrpXJ0eQm02RxHFk3hOdsylKlgryzc4bNhZFGzE+cL2knmMRfV:W2Q+A64l7VX1TnRrpXJ0eQm02RxHFk3t

Malware Config

Targets

    • Target

      58409c52b6d493a27570b98e64227437976eb48d9623bcbb5262f388501c388c

    • Size

      134KB

    • MD5

      f8fe981dcc793142ed8466f2735bc7e5

    • SHA1

      8e52ec5bab7327b2f42133a4ca292ec266edec05

    • SHA256

      58409c52b6d493a27570b98e64227437976eb48d9623bcbb5262f388501c388c

    • SHA512

      15a4936961fd1ae4f0b0a5ba42a3b35a9d35c2e61ec3363104b81df4278c5f5d727f61fb4d6d70c1339e0e728054121e6f61d77bbecf9476fc0d41c26583633e

    • SSDEEP

      3072:W2Q+A64l7VX1TnRrpXJ0eQm02RxHFk3hOdsylKlgryzc4bNhZFGzE+cL2knmMRfV:W2Q+A64l7VX1TnRrpXJ0eQm02RxHFk3t

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • An obfuscated cmd.exe command-line is typically used to evade detection.

MITRE ATT&CK Enterprise v15

Tasks