General

  • Target

    test.zip

  • Size

    1KB

  • Sample

    241013-wlawvazdnd

  • MD5

    edf500aac9f88dbb79a77e3b6cf0f77b

  • SHA1

    f51aa2684b80501518d0c3642021663a99570fe6

  • SHA256

    9d3dbbde9112374e740ac6a646ab64e55281226b50e3f27348b2d83fb4a96085

  • SHA512

    7a939952d4693204d41cc3d120dd344ca013bf5ae207da9b3f1f9fc682e60caaf70ffbcc661b9d870239925c73a1e404e065944dac3332474a38a6fca43647e6

Score
8/10

Malware Config

Targets

    • Target

      test.doc

    • Size

      2KB

    • MD5

      f5fc224eb5cbbff8ee4bf4670ed9611a

    • SHA1

      8e3f85dd6fb94da77990987bd26bde7e59042490

    • SHA256

      80f7f23bea03b2386ae91e156835c2a685d9515e0c42f4dd89f782d64a29f701

    • SHA512

      4902cd1f9f166a2bc3136276e2baf251e40dc196885be38e8b38f034fa9829b390c82a9ea9474cb11c3f84460997540489a3455d327ae62ae7f95f78131f8330

    Score
    8/10
    • Blocklisted process makes network request

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks