General

  • Target

    b04ae1f9f112563b43ab832cbebc1765a0b474d1064edfc6f20f562ad5ab6ef7

  • Size

    217KB

  • Sample

    241109-1yccnatcjn

  • MD5

    fac5826ae63ab6b00f75cff48e32f4d7

  • SHA1

    b244f49a95615a752af1ee2b4d068da1c2471d88

  • SHA256

    b04ae1f9f112563b43ab832cbebc1765a0b474d1064edfc6f20f562ad5ab6ef7

  • SHA512

    ceefdeb8e56fc516a9a895bd7d923e71cb7256604267be2fef73ef9f0ddac9e50b30aa832233b261bd50cd9f523952a247f174223d63d24cfb04764eadcba8d2

  • SSDEEP

    6144:5FVeEsjdXRC3jexGG6FYWofEcHIVwWGFkiq:5FVeEwdXET0W8EB+WZiq

Malware Config

Targets

    • Target

      b04ae1f9f112563b43ab832cbebc1765a0b474d1064edfc6f20f562ad5ab6ef7

    • Size

      217KB

    • MD5

      fac5826ae63ab6b00f75cff48e32f4d7

    • SHA1

      b244f49a95615a752af1ee2b4d068da1c2471d88

    • SHA256

      b04ae1f9f112563b43ab832cbebc1765a0b474d1064edfc6f20f562ad5ab6ef7

    • SHA512

      ceefdeb8e56fc516a9a895bd7d923e71cb7256604267be2fef73ef9f0ddac9e50b30aa832233b261bd50cd9f523952a247f174223d63d24cfb04764eadcba8d2

    • SSDEEP

      6144:5FVeEsjdXRC3jexGG6FYWofEcHIVwWGFkiq:5FVeEwdXET0W8EB+WZiq

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks