General

  • Target

    e2dcb55f6bc339674b8e046e3f72a686a51c8973ae022b31a2dc3f8ebffd86b5.js

  • Size

    160KB

  • Sample

    241002-b3n5ks1cml

  • MD5

    0d68d14f20f06208478b8cbbea1830b9

  • SHA1

    47edec4639ecdb5ac0277749577b89f9ac2873d4

  • SHA256

    e2dcb55f6bc339674b8e046e3f72a686a51c8973ae022b31a2dc3f8ebffd86b5

  • SHA512

    936582a9e56d92bdbc49e46c4a0eb32344dcf0ee3b64f54cc2e97eb5bd0f5cad6d1e34a4bda6493c9cc64f196445b4ba34ac41f00c65447ddebc1fd29472bf32

  • SSDEEP

    3072:wgeWyqg5puqGpZw70BpuXruxZwoT0t17soR66I3F5kfa:o9PGUwpuXCjwoYtGr6Iky

Score
10/10

Malware Config

Targets

    • Target

      e2dcb55f6bc339674b8e046e3f72a686a51c8973ae022b31a2dc3f8ebffd86b5.js

    • Size

      160KB

    • MD5

      0d68d14f20f06208478b8cbbea1830b9

    • SHA1

      47edec4639ecdb5ac0277749577b89f9ac2873d4

    • SHA256

      e2dcb55f6bc339674b8e046e3f72a686a51c8973ae022b31a2dc3f8ebffd86b5

    • SHA512

      936582a9e56d92bdbc49e46c4a0eb32344dcf0ee3b64f54cc2e97eb5bd0f5cad6d1e34a4bda6493c9cc64f196445b4ba34ac41f00c65447ddebc1fd29472bf32

    • SSDEEP

      3072:wgeWyqg5puqGpZw70BpuXruxZwoT0t17soR66I3F5kfa:o9PGUwpuXCjwoYtGr6Iky

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks