General

  • Target

    e858608dab4d72142f8895b0bdb426c30bce24b0b5f725c355b91cf036100090

  • Size

    231KB

  • Sample

    240920-bp8xts1eqd

  • MD5

    d5f41af05103f42d357cc7908f9d0836

  • SHA1

    e7d3a78dfa0db696bd5b44862570fa0bb42ce842

  • SHA256

    e858608dab4d72142f8895b0bdb426c30bce24b0b5f725c355b91cf036100090

  • SHA512

    13431d883aad3668d9b117b928d4b05ad19e0b248b7ee9b521c3cdeff0f88c0d0e9d5fdb8a10b3991ca68a577f58e6050cf20450c0f7ab1cf6a98a5ed64be6a4

  • SSDEEP

    6144:lr4DeFpRHL+5LNOT5x5sFGVyci7Ej3ZiECwC+zlg:lr4DwpRrKO1YYVhiiSwHO

Score
10/10

Malware Config

Targets

    • Target

      e858608dab4d72142f8895b0bdb426c30bce24b0b5f725c355b91cf036100090

    • Size

      231KB

    • MD5

      d5f41af05103f42d357cc7908f9d0836

    • SHA1

      e7d3a78dfa0db696bd5b44862570fa0bb42ce842

    • SHA256

      e858608dab4d72142f8895b0bdb426c30bce24b0b5f725c355b91cf036100090

    • SHA512

      13431d883aad3668d9b117b928d4b05ad19e0b248b7ee9b521c3cdeff0f88c0d0e9d5fdb8a10b3991ca68a577f58e6050cf20450c0f7ab1cf6a98a5ed64be6a4

    • SSDEEP

      6144:lr4DeFpRHL+5LNOT5x5sFGVyci7Ej3ZiECwC+zlg:lr4DwpRrKO1YYVhiiSwHO

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Enterprise v15

Tasks