General

  • Target

    fa10eb739f1d697be31cf23ab10332972a7e43413f48e8324cb45b2350e353fc

  • Size

    43KB

  • Sample

    241221-r47lba1nex

  • MD5

    378e7419ccf468187a69b7537f7e2269

  • SHA1

    bb4e4b2452a248911916ca8f0089d73dd2a2a7e9

  • SHA256

    50b6c38776660b01a629d581db1fc78382f0ae84be8bdda607179dd1bca0305e

  • SHA512

    6232782236371813998bae026e64978d73e1e24bb7bb8c95b4249dd17e2ee53f5370650f1859d6fc70b3996e167720e886a23416be4a6edd9eb65f7565c30e82

  • SSDEEP

    768:4pWHBCLnrAG6PPEvSKHX49dSJAePaLeelBf1FYWXH/USJybBZISUa/KKv8d+db4G:W/LrQiSmuStueeNFYVSAVZJUaiKvRGG

Score
10/10

Malware Config

Targets

    • Target

      fa10eb739f1d697be31cf23ab10332972a7e43413f48e8324cb45b2350e353fc

    • Size

      188KB

    • MD5

      12e23ec48ad0386ed948b2d2b11c4dcf

    • SHA1

      3c5f14a0ba6f3b6a586ad16f31175e592f3aeeb1

    • SHA256

      fa10eb739f1d697be31cf23ab10332972a7e43413f48e8324cb45b2350e353fc

    • SHA512

      32335ae27614bfdebbfc1d17f7717c6c8a26dada9fac14baaecbafc45d71e6bc33f1c37e07316521fd7f5d6d8d99ba20d3167f24a290250a2cefdcb7ed2561d7

    • SSDEEP

      1536:nw61WyMW/kIeCMcGWJQYK4u9WEwSEmP4/OKkIeCMcGWJQFK4u9WEwSEmP4/O5K4F:n6ctltCtIt7

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks