General

  • Target

    1a2b49c861ff2edc24b949b96cfd4024e773d9c4c52f690002f0494bc4bfb8e2

  • Size

    59KB

  • Sample

    241221-r2g8ms1pgm

  • MD5

    171b5d8c5ea09e80bb57c704666bd8f7

  • SHA1

    4ae924978935be86764320dfbe902e5ef3a41bbc

  • SHA256

    49efbcec489570b83cb4946cca36487e2237f8248cfe74abedf5cf26f942bcfc

  • SHA512

    5dfb2f4666574ca0665cf1015a23d39447f0fa4fa1b13236f7d986e679d4fb7111038851083096a61e0e83f92a2442df1c6125b1e0fdac6be2d459d16be80f79

  • SSDEEP

    1536:ELud63BdR6zQfUfqNOQVSJDOKnfpPAqIogfJ/IbwdZT1IiWf:EL+63Bd4WUfqVVSAepPAfbvjqz

Score
10/10

Malware Config

Targets

    • Target

      1a2b49c861ff2edc24b949b96cfd4024e773d9c4c52f690002f0494bc4bfb8e2

    • Size

      221KB

    • MD5

      a204092553829a6c4eb083031956bf75

    • SHA1

      d36399d0bf673b284dbd6776c829843bc2530b47

    • SHA256

      1a2b49c861ff2edc24b949b96cfd4024e773d9c4c52f690002f0494bc4bfb8e2

    • SHA512

      f591d7c5e182dffd9b0c2709a80141592ca2397445c4df636a911ba7d03b15be60b28885ec7c1e3c1e708810986bc4c42e056a4bd5832d51a7e5565a080c61f9

    • SSDEEP

      1536:nwNWlq0pBy8WgeH4rJ0hyI3Tq9Ca4+XqTHDYBy8WgeH4rJ0heI3Tq9Ca4+XqTHDt:nvq0XApj+ADsABj+ADZj+AD+AKAp

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks