General

  • Target

    84bca49e22af81e7e7e34ad3ad995c5004cbef1fb01542d2ccb7599425e0f5e7

  • Size

    42KB

  • Sample

    241221-r47lba1ney

  • MD5

    2a5386fa4bd6378109df73973b79dfb2

  • SHA1

    a440441117aa5a7d51ae5560d1428eeceac60ef1

  • SHA256

    0126a6c333cdd417d4b13fbc399cff6dd5e5dfe90ab0ff983a49b6677d7c989d

  • SHA512

    8982480f0eee9815479593c43a8034cedc4e4b1cceaf44257ab82a87b3fd5f8bdfa3e546f31a7e6bc522a2f5353b2a9a53d11a7db20a11f5cfc58d36a2e514ab

  • SSDEEP

    768:OWO0lqbOD0SKP65eWtAW+MfBBBJVaCMESxBNyAAngIDMlXgShuuu1P1KuOQWVrm:OWO0lTD9KPI7+MTMCrSxHOn8FFuuu1PT

Score
10/10

Malware Config

Targets

    • Target

      84bca49e22af81e7e7e34ad3ad995c5004cbef1fb01542d2ccb7599425e0f5e7

    • Size

      181KB

    • MD5

      e2dfa56c2ec7e4376ef630de47f610bf

    • SHA1

      4188ba70e5c1c6e62a1480490db1f476830090e7

    • SHA256

      84bca49e22af81e7e7e34ad3ad995c5004cbef1fb01542d2ccb7599425e0f5e7

    • SHA512

      66fc2414565ddc5e849ce70d1a5121f0b27f9024f0304964ccd546eeae374db279afc685a9b0b5abee11afbc24858096e1ce7e3f69b67e7fb7e326ecabf60e13

    • SSDEEP

      3072:nD6z9By3qoE0Yz9By3qoC0t07z9By3qoez9By3qo8:DAk3qhk3qHk3qBk3qx

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks