General

  • Target

    81dab2cbca366f772661f33df4c45cb2b486ca1629cef9206dd6fb98125998d3

  • Size

    134KB

  • Sample

    240517-e9bplshg76

  • MD5

    bb6d40ce3fd277853502a1935ae4696c

  • SHA1

    f6eb9a91bb8dee8470760020ea8f3381c8f5f740

  • SHA256

    81dab2cbca366f772661f33df4c45cb2b486ca1629cef9206dd6fb98125998d3

  • SHA512

    c230ac5a0c13f96bdf854243088b3b033729d6c85b0d7f7c6d52d3574b566f74326289c1bdd796a344e45013dfbb5d25f6fe192fc98dded3e68972308bb8b772

  • SSDEEP

    3072:H2Q+A64l7VX1TnRrpXJ0eQm02RxHFk3hOdsylKlgryzc4bNhZFGzE+cL2knmMRfV:H2Q+A64l7VX1TnRrpXJ0eQm02RxHFk3t

Malware Config

Targets

    • Target

      81dab2cbca366f772661f33df4c45cb2b486ca1629cef9206dd6fb98125998d3

    • Size

      134KB

    • MD5

      bb6d40ce3fd277853502a1935ae4696c

    • SHA1

      f6eb9a91bb8dee8470760020ea8f3381c8f5f740

    • SHA256

      81dab2cbca366f772661f33df4c45cb2b486ca1629cef9206dd6fb98125998d3

    • SHA512

      c230ac5a0c13f96bdf854243088b3b033729d6c85b0d7f7c6d52d3574b566f74326289c1bdd796a344e45013dfbb5d25f6fe192fc98dded3e68972308bb8b772

    • SSDEEP

      3072:H2Q+A64l7VX1TnRrpXJ0eQm02RxHFk3hOdsylKlgryzc4bNhZFGzE+cL2knmMRfV:H2Q+A64l7VX1TnRrpXJ0eQm02RxHFk3t

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • An obfuscated cmd.exe command-line is typically used to evade detection.

MITRE ATT&CK Enterprise v15

Tasks