General

  • Target

    ac4e5f6f39aebb0f686813bd7ef6b678050d0876f05bd6f30aaf7d08f2d0d7d7.doc

  • Size

    360KB

  • Sample

    240613-carknstemn

  • MD5

    39990481e7a4ebc5ee5b30b8f9ecb44b

  • SHA1

    48d884a85d9ef84e8726a8c825f0722878ab75d1

  • SHA256

    ac4e5f6f39aebb0f686813bd7ef6b678050d0876f05bd6f30aaf7d08f2d0d7d7

  • SHA512

    1c231dd4947d81b64e7e4dd526addc7d568b7e1b5049b41138073a38585c1a2cc0c54e88d4c5c40483bd29261169299e8552f3651c3e43fda98fafef0410f10c

  • SSDEEP

    6144:FwAYwAYwAYwAYwAYwAYwAYwAYwAYwAPIwL:uv

Score
10/10

Malware Config

Targets

    • Target

      ac4e5f6f39aebb0f686813bd7ef6b678050d0876f05bd6f30aaf7d08f2d0d7d7.doc

    • Size

      360KB

    • MD5

      39990481e7a4ebc5ee5b30b8f9ecb44b

    • SHA1

      48d884a85d9ef84e8726a8c825f0722878ab75d1

    • SHA256

      ac4e5f6f39aebb0f686813bd7ef6b678050d0876f05bd6f30aaf7d08f2d0d7d7

    • SHA512

      1c231dd4947d81b64e7e4dd526addc7d568b7e1b5049b41138073a38585c1a2cc0c54e88d4c5c40483bd29261169299e8552f3651c3e43fda98fafef0410f10c

    • SSDEEP

      6144:FwAYwAYwAYwAYwAYwAYwAYwAYwAYwAPIwL:uv

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks