General

  • Target

    8cead036023724fc3ebd0a3159a858e08bece866cde00d1d786a9cb55dd471fb

  • Size

    54KB

  • Sample

    241221-r6ey3s1qdr

  • MD5

    b74e3a0a482148cf9d2c947548e8edae

  • SHA1

    79e335654b9592bbfb527221dba7d28a952abb60

  • SHA256

    3d4f73af0df675323eef56b841b033e0c23bb463cf739d516ea8254797c81489

  • SHA512

    0357a5d8adf2520b212875f5f5f1cb970eb45e130e7ee3ce9d1c5bffbe8f4c92ab34acfec2b176f6936b619bc692fed733fdda518aa6a6a700f91e35f7064c94

  • SSDEEP

    768:+WGwmX0yw7ix2zXeDeFEA9NGS4cUZzy7ejP/kbsS6LusYpkbByLKbF5iZw5TVk1I:+WGwXigeLzSNUZKckxCYpBL6FMwga

Score
10/10

Malware Config

Targets

    • Target

      8cead036023724fc3ebd0a3159a858e08bece866cde00d1d786a9cb55dd471fb

    • Size

      196KB

    • MD5

      3cca4f8f7f8b3686171c3dcccbda6f7a

    • SHA1

      8bfb956c6e8c2825e8b0f2f3f329798b6a63a306

    • SHA256

      8cead036023724fc3ebd0a3159a858e08bece866cde00d1d786a9cb55dd471fb

    • SHA512

      41d73fd8fb62099af9a67f760df046b7520e129e10558fd9bd1b154273fb2e944d5de65856fd21addca9414667cae5f8622b9a522db552fd91f3f7e6580e812e

    • SSDEEP

      3072:n6R/BDhNMpsA+neBDhNopsA+nPpsA+nzBDhNTBDhNw:6R/CrtqrIry9e

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks