General

  • Target

    493cc3ec025096c8c9911f0d7920dae7cfc775daf9ef0e7441053cf9c7bc044e

  • Size

    46KB

  • Sample

    241221-sfsb6a1qat

  • MD5

    2e049d2c0c73934f5b604beebdaca19c

  • SHA1

    ce7c503b998d48d7a50d14578f90eca37bb8f666

  • SHA256

    a54c6da5dbc73d82721ca9968cb5d7f6db1e0963fd2dc4cbef509b4247094add

  • SHA512

    e3508ac7e261ddc26cef079f958113c8f6e9e4440f474546117990048961f2f9bfcf636b14327bb73c3a9d788f708eaea222a0b4995157bce2e209d48e1b0933

  • SSDEEP

    768:p0IOVS7VjJBDHT7wAu8o8cM7tEmp9FvhgNAjar1cRd46juZvWdNqZJq:+IcSBbz7wB8o3M7mC9rgAarGr7uhwr

Score
10/10

Malware Config

Targets

    • Target

      493cc3ec025096c8c9911f0d7920dae7cfc775daf9ef0e7441053cf9c7bc044e

    • Size

      202KB

    • MD5

      4cf4a8e642c9b21d7b81e7d81d78a7ca

    • SHA1

      ddac057c2c294eb0ae9042550b505eb8f5cff3d9

    • SHA256

      493cc3ec025096c8c9911f0d7920dae7cfc775daf9ef0e7441053cf9c7bc044e

    • SHA512

      aaadbc82fd50e6a7c1f9e57894c016dfbf5c47c3cb7043163f94a81842d4625919c64f29a8f0d3df88fb0a3748824e1688d840a0fa53d241dff642b383e9fae9

    • SSDEEP

      1536:nwR+UVd8gM+1hi29p4BKs3vT7a/hdpqE58EHS8gM+1hi29p4BKs3vT7a/hdpqE5O:n+h4pm2h4BmRmeh4rh4y

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks