General

  • Target

    f2f329a6e8cbe33c20645525755d51d997ca9939274d7f33c08e1c753f3bfe12

  • Size

    77KB

  • Sample

    241221-r8r2es1pax

  • MD5

    f0d6ba7d13ca7abdfbcacee8dc8906a6

  • SHA1

    96bfa1c47f26c3155ec6a802e67287ac7c529098

  • SHA256

    12ba1c9dc36e2b77bd698b436326287d34c1dc18684c8f84c31fb2d76509a381

  • SHA512

    d3fa0c88228afac083621f2a12313f6f684fe963d77dabeea0afb52e4feee0d3119b5b664e91687332e374a83e8c628a49098bd78a77ff513673bc133c34a108

  • SSDEEP

    1536:xrS67ixTogDORZSMO2OskXAfwYNZncMQ1OlEloOKMT6Yhrdex1YZ:xrSoSDUZSM4skEwWZncYmoOK1ai1YZ

Score
10/10

Malware Config

Targets

    • Target

      f2f329a6e8cbe33c20645525755d51d997ca9939274d7f33c08e1c753f3bfe12

    • Size

      255KB

    • MD5

      8a64f332eec507a5ca7cdecdd3329584

    • SHA1

      13f633512645b00097c8658d1ff05fbf7d33aa25

    • SHA256

      f2f329a6e8cbe33c20645525755d51d997ca9939274d7f33c08e1c753f3bfe12

    • SHA512

      3ce65f5be0c8434f0395d9fc44d5691e11abd361f31018b63b91c56c663417feae9a93785f30ca041ecf08cc1d437a12547664ed12bd622fb8e7abba94117e62

    • SSDEEP

      1536:nwpImsQw3kO6iF8n7aJYgA/x7ncxtcGBwokj3AmsQw3kO6iF8n7aaYgA/x7ncxtC:n5invc7c9YinSc7c98c7c9minUinw

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks