General

  • Target

    411e6b52b9aed07875c0938c44dd3e2139d998a018ea48c0d92d820c7ab377cd

  • Size

    42KB

  • Sample

    241221-sb7ahs1rcn

  • MD5

    97284c282e3a1fd9d22e0a6fae3031b4

  • SHA1

    274280660ac2987ee837b1882db022c1fbfc9642

  • SHA256

    9f387beac4806963e20567121996e2275d4c5b53d7200466d1ce4a918edfc8a8

  • SHA512

    d052505fa8385d168929ac357f1a43cd1d1ffb9f66237a7278b485e0c9995d46ae6b658e946264725612b3c8604ebab88c3ca0eb8e8afcb1c8a365b8db8dee07

  • SSDEEP

    768:qsKSZst+BdthdiOUGwc2D+nZw2cLUfqagQxHmKS4A2m5ZXt7kc0Rntn3cePUpsII:F007MOrwfDGe2cLUH1GKS4Fm5Z97ynM4

Score
10/10

Malware Config

Targets

    • Target

      411e6b52b9aed07875c0938c44dd3e2139d998a018ea48c0d92d820c7ab377cd

    • Size

      180KB

    • MD5

      d55b433aad1a0db88629f7e4729d74a1

    • SHA1

      70797175d65e80e9adb2d8999a144f31511a7a35

    • SHA256

      411e6b52b9aed07875c0938c44dd3e2139d998a018ea48c0d92d820c7ab377cd

    • SHA512

      1bf71522a486e6cae023b45e5c28e151bf93e672af48117717154b2e8d2e7a1de250932776bbfade5ee140c78704e53d61dfc4e64c59bfaa91af6c63b8b875a1

    • SSDEEP

      1536:nwY/0nBMSz0j4nnPDCu25s78yRzCU5qqPRILBMSz0j4nnPDCu25sO8yRzCU5qqPU:nfSNnR4yVSNnR/yjyVSNnRTSNnRj

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks