General

  • Target

    6f13e1d5a85aa66734cca6d1a58b46d507d33a5dc390e8d5f624bb638761efa1

  • Size

    194KB

  • Sample

    240517-fpeffaaf86

  • MD5

    e6807dcf6f1a79e89f91304c2ecc0108

  • SHA1

    290b7fe0bb9c55cb3620db702bd6f53c35ae50c2

  • SHA256

    6f13e1d5a85aa66734cca6d1a58b46d507d33a5dc390e8d5f624bb638761efa1

  • SHA512

    829050d82b72c60efb286fcf13922498045b92dbd486c365c143b8d936df021e1a514984915360bd7bf30c01540b19b744dd1a816cd8f41a153186e5f0f6b2b5

  • SSDEEP

    6144:MkQ+A64l7VX1TnRrpXJ0eQm02RxHFk3hOdsylKlgryzc4bNhZF+E+W2knmT8tD1d:7x4+oI7Gh0Bx

Malware Config

Targets

    • Target

      6f13e1d5a85aa66734cca6d1a58b46d507d33a5dc390e8d5f624bb638761efa1

    • Size

      194KB

    • MD5

      e6807dcf6f1a79e89f91304c2ecc0108

    • SHA1

      290b7fe0bb9c55cb3620db702bd6f53c35ae50c2

    • SHA256

      6f13e1d5a85aa66734cca6d1a58b46d507d33a5dc390e8d5f624bb638761efa1

    • SHA512

      829050d82b72c60efb286fcf13922498045b92dbd486c365c143b8d936df021e1a514984915360bd7bf30c01540b19b744dd1a816cd8f41a153186e5f0f6b2b5

    • SSDEEP

      6144:MkQ+A64l7VX1TnRrpXJ0eQm02RxHFk3hOdsylKlgryzc4bNhZF+E+W2knmT8tD1d:7x4+oI7Gh0Bx

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • An obfuscated cmd.exe command-line is typically used to evade detection.

MITRE ATT&CK Enterprise v15

Tasks