General

  • Target

    cbf48e717b0cc3f95e338deb6607482dc1d58957b286f831308c98a80fb98985

  • Size

    36KB

  • Sample

    241221-sfs9fs1qav

  • MD5

    3a6fbf678bb8506b1dfdcc2e76354ea4

  • SHA1

    f53bc2cacac40f34df0c42da1d88d29f30036980

  • SHA256

    d635933a5b5557469f5afed4b976e37249bdc6acb83828528274e72ac2e35e48

  • SHA512

    49876b3c6d1d751adfe58979ccabf2c4450b1924cc3790a2a67388e5c9e358a3757c73de8b46088611c171353e9285c8ff25ccd68a6beebfb8a641f27d7a60a5

  • SSDEEP

    768:xYGSbnfzPoebxGxRBV3VV6sKnAcZpD1xL+vDjjjjjjjjjjORAt2CiAeF:RMjoeM/VypZ9sDjjjjjjjjjjORAt2CKF

Score
10/10

Malware Config

Targets

    • Target

      cbf48e717b0cc3f95e338deb6607482dc1d58957b286f831308c98a80fb98985

    • Size

      153KB

    • MD5

      e9878ff72379271b3bd05134c456844f

    • SHA1

      63e47cbf93f84e771ff00b62f88d12a544e282aa

    • SHA256

      cbf48e717b0cc3f95e338deb6607482dc1d58957b286f831308c98a80fb98985

    • SHA512

      ad1d728f26dccc1a18a709f7691614a54b8e6fd9b23d7ec3a67e8e08d64092ed5f638836d83fdc5e434e04a0c4cb41086876ca1c6931376d6576685d0f30d1ba

    • SSDEEP

      1536:nwgfiEWNK0XGKMr5GY0WNK0XGKM+5GYz5GYDWNK0XGKMLWNK0XGKMi:nxAuK0uKAuKTuKr

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks