General

  • Target

    372da55f033558f502efcba706e5e4bc3b411254b0239c905f91226d98ece9bb

  • Size

    40KB

  • Sample

    241221-slrmtasjcq

  • MD5

    d51c47b4decb73e471f719b10d3bee00

  • SHA1

    fd8292fa3ae547ec2a0b60d87dc415093dfecfa3

  • SHA256

    38f787d30d945d7c8d3c77759c7ce0f022cbb043dabd35a8b44bf76b2b495f27

  • SHA512

    bf892bdd6bd21138f44cb98eac6b7ebd3b4a32105d8c19883361b71aeada064caf4e583bf3d8fcfbe1b7fdd250b90263d32b9981881d4da1b48cdc3973d32fb6

  • SSDEEP

    768:/Ne+jlyUuD1Ez1WjJ27UPsdaGaev9KkaOrspaAG2kd/0plrsZZ:I+jldz1Wj4Q6Va/iwwAG2Gt

Score
10/10

Malware Config

Targets

    • Target

      372da55f033558f502efcba706e5e4bc3b411254b0239c905f91226d98ece9bb

    • Size

      173KB

    • MD5

      c408249fdae85da2d16c7ed730cf0ea0

    • SHA1

      63bef6bd09f32f3aec2323d9e84242f2b056e818

    • SHA256

      372da55f033558f502efcba706e5e4bc3b411254b0239c905f91226d98ece9bb

    • SHA512

      509453e95872d174535fe0db7cfee9a92c1d7c693fe682f4969fb36d3829d251b45f29b50338a38f9558ad7cdae145ab44a67469e73c901848a9e0861426d282

    • SSDEEP

      1536:nwg5QqRPR1Amyb6uAh2hjV/M6KoVl310U/xCbT5Lmyb6uAz2hjV/M6KoVl310U/Q:nYAhY0a0skAzY0a0sIY0a0sJAtAE

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks