General

  • Target

    47f5066d56405ce742ca51bf7b08c57ae3162d1e71a37377622d80b2cfa4e270

  • Size

    79KB

  • Sample

    241221-sb6zra1pdt

  • MD5

    3be824ac740294db897542271a276250

  • SHA1

    157a86b0530ad4a65c4da555932994b8a76fcea2

  • SHA256

    66201c1ee264e3cba2f020adcc988bd8b9d521be1ae86122bef958fec366bf09

  • SHA512

    636062a11d85d98bce9d331f337e15c757d414903144d51d42e06927aaf56b8116abda4b1cf0c5eab343842a57dedd3826a6e4359b7b65e44eacab7a76912c11

  • SSDEEP

    1536:HUX2IbhREecATrW7GzmTCD1L/R/y84sB7KpXBHyU9fbV1Du9+x:HUX2KhGecATCGHhL/R6Zs+XBHB9DV1DF

Score
10/10

Malware Config

Targets

    • Target

      47f5066d56405ce742ca51bf7b08c57ae3162d1e71a37377622d80b2cfa4e270

    • Size

      260KB

    • MD5

      4428460474aab08080959201f4c92e49

    • SHA1

      c886dbdf025873eaa6fea622bc9f07cbdcb32ec8

    • SHA256

      47f5066d56405ce742ca51bf7b08c57ae3162d1e71a37377622d80b2cfa4e270

    • SHA512

      2e1a1152dbefa9921f5e103475ae703f47638689a5b5d8b5d8e7fc326bafc51adec911540b9f6e75520c1e0a1cd60ffa5c0f9fc855226bf5c4a33e042f890f37

    • SSDEEP

      1536:nwThJnwjid8P1B8hDG6R1mnNX7kyTknlPnwjid8P1B8hDp6R1mnNX7kyTknl46Rc:nomlTs3flTs8lTsGNT

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks