General

  • Target

    eicar-word-macro-cmd-echo.doc

  • Size

    32KB

  • Sample

    240625-tpz9sssgqm

  • MD5

    255a9225a28d02c1049f500c03f57285

  • SHA1

    792930d5c85059c2d22010f42c65c6140b2efa5e

  • SHA256

    03d0985601b7b6e75036b48b9f835bf8b3d664a894f74e80b761627f4cd69749

  • SHA512

    6583f0438243611dab02e9d9d043e20e7b15b51b99b210dd93f24aa9e8d931934115779bda752e992a53ec4cd25ee22ac009096a3833a5b3b8de2892f71062ae

  • SSDEEP

    192:wZNslLZEvA+6/6rrILd/Kf3HO8teFrC7audhsKmy0jbLhytRQWwU39Tzuanb:wE8iSUR/8dehzHdy0jbL8t1wU39Tzr

Score
10/10

Malware Config

Targets

    • Target

      eicar-word-macro-cmd-echo.doc

    • Size

      32KB

    • MD5

      255a9225a28d02c1049f500c03f57285

    • SHA1

      792930d5c85059c2d22010f42c65c6140b2efa5e

    • SHA256

      03d0985601b7b6e75036b48b9f835bf8b3d664a894f74e80b761627f4cd69749

    • SHA512

      6583f0438243611dab02e9d9d043e20e7b15b51b99b210dd93f24aa9e8d931934115779bda752e992a53ec4cd25ee22ac009096a3833a5b3b8de2892f71062ae

    • SSDEEP

      192:wZNslLZEvA+6/6rrILd/Kf3HO8teFrC7audhsKmy0jbLhytRQWwU39Tzuanb:wE8iSUR/8dehzHdy0jbL8t1wU39Tzr

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks