General

  • Target

    6470f81d1d6b4bb0af39d506f5f4cebffc3ed8b3916d5e01c5ad65b91ff6483a

  • Size

    39KB

  • Sample

    241221-sj21rs1qew

  • MD5

    6f0adc3d871f409dca61de9a2f833eb1

  • SHA1

    e7bdd641b7c538350422db4aab460239fb29bb08

  • SHA256

    360da4575bc5f83d1b74e35cdf923af87035b64721bc4545a170dec6ceca2eeb

  • SHA512

    85b2a8d29fc85eae5e64ec83455a1ef4135d7ad7b1a491290f3b04d591ea89ea14a96885561a9d0a3dd15a5ae726bcbc6397398f051d1adc8e392b3e210ab9f6

  • SSDEEP

    768:pubkcPQ5D6ZAzaDqdx7tmD0JMMlO8WK/p2UykcsXVqwrsbiM2Bx:puHPQ5O6aedxZmD0ljWKBCkcwVqwrsbI

Score
10/10

Malware Config

Targets

    • Target

      6470f81d1d6b4bb0af39d506f5f4cebffc3ed8b3916d5e01c5ad65b91ff6483a

    • Size

      166KB

    • MD5

      09a3e42c3dd0cf470d13f81a39f055df

    • SHA1

      8b42976021c2090c3ce85ba6d7da3bb49cd61b76

    • SHA256

      6470f81d1d6b4bb0af39d506f5f4cebffc3ed8b3916d5e01c5ad65b91ff6483a

    • SHA512

      7ea276aa67307eb5770df32610b30215785099f2280a1cb99c3bf0995f2b36c84e3aa9d682edb26bae5b72666a1161ee2c39a7ad207be51a59a64cb36246b72b

    • SSDEEP

      3072:nVoJp7LJHxi5NZDoHxi5dZDBZD0Hxi5PHxi5i:kRihoRiND0RiZRiQ

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks