General

  • Target

    345b3f8036d5b93995334289ff468e73e93aaac22ee0f40d6e965bcf854f1939

  • Size

    59KB

  • Sample

    241221-se2jfa1pg1

  • MD5

    9dd6946c370fbbba41a522d1f6f1850d

  • SHA1

    b6e61bd93543fbd3b5d9f56c3d2d7cf58169a181

  • SHA256

    f6059943a43a16c530afe328933b6448ad80969d3036e5372c772c6d6c403f82

  • SHA512

    cfccde2c3657f6f10e82ffaec4ddd94a16b97579e9f1d38b427309a56874e9ecbf524a0f0727c829aa5363153d28a1ef4028a4cc541ce628f43418fc75b5f81b

  • SSDEEP

    768:FzahEOizIMUPDm/UncNuKJqns40OA4sIkxETuDxJpwEv+hjHTW96wVhSkk+44u5w:6wxUSLrNHb7WHcZVm+7cb7ZtBA

Score
10/10

Malware Config

Targets

    • Target

      345b3f8036d5b93995334289ff468e73e93aaac22ee0f40d6e965bcf854f1939

    • Size

      217KB

    • MD5

      5df4ce8cb9078a3f29305e76f3dde592

    • SHA1

      e0b42f7c4475cd54ab46a9eb131da852162ad2fa

    • SHA256

      345b3f8036d5b93995334289ff468e73e93aaac22ee0f40d6e965bcf854f1939

    • SHA512

      3135a015a300f08e4c149c1734455f0a5b0ef15f810dc88d4a8c3360146e33b03fea965851c64071bf75caea0af6c840f07286d16038f1e315ff24285d2ae68e

    • SSDEEP

      1536:nwEjLrwa7qpg3rSoY9BdiBJprdq+VcGma4H52scrGpwa7qpg3rSoY9BdiBJprdqQ:nPphmjhv+phDh4

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks