General

  • Target

    006404a9981d9352e1e9147a2d3296f1c6a9498f32bbdc403e32f5894e368bd0

  • Size

    43KB

  • Sample

    241221-r7edya1ngx

  • MD5

    ed241bce6abdc2de23163ce8a9109ba6

  • SHA1

    300d7f39b69f31120f30474efffeed72c27ca372

  • SHA256

    9cfbbd37b843aa2baa647cbe3263de1976df87168595004fae6a175ecad46352

  • SHA512

    d852fdb014ac380ea7fb07f4b47b4d02b392866ce135c127a78bafb41bc5dbe6f699ceecb377198940b0c62751f808d742559ce312b2d09af3a8b70584086836

  • SSDEEP

    768:MFwauhu2HSuJp67AaM23CZ7Zrj3JcPjJ690eVcO1kcxEIsTp5JlgbtdASMCzyuu0:MF6huhi67jMz7dFuIZxVs1qbtdA+yuu0

Score
10/10

Malware Config

Targets

    • Target

      006404a9981d9352e1e9147a2d3296f1c6a9498f32bbdc403e32f5894e368bd0

    • Size

      183KB

    • MD5

      35ee90514aff74a501a8a2553e874d85

    • SHA1

      14d8b905fb3d72286b408f09dcd259758b834555

    • SHA256

      006404a9981d9352e1e9147a2d3296f1c6a9498f32bbdc403e32f5894e368bd0

    • SHA512

      42bf396ea6c141bc537c51c57ee2ccdfe6078ce87af3edf678b388881b18fcb2a993faa4bdb9b79b8b7c2d9dbd1c85a49ed841128dad4e9f7153f57a6ab686da

    • SSDEEP

      1536:nwJ0kCX8CZgi1jai/byFwkCX8CZgE1jai/byFz1jai/byFSkCX8CZgIkCX8CZgi:nzH8LqYwH8LkY5YSH8LIH8Li

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks