General

  • Target

    951ea46c0075499ef18d4b51d67c7bcc4cb6cefae82db68b29d0625d325d0d29

  • Size

    38KB

  • Sample

    241221-sp5zlssjhj

  • MD5

    cfdc0a79cd75673172fb3427b6bf02be

  • SHA1

    c7e6975d57fb570800b6222eb8769b3718a0ed77

  • SHA256

    31737016ed2c3a81bab37e3543a6cdaa911ed16249b2fe8309d9c14ad2367abd

  • SHA512

    902f238790e77e005a97a2e54d10a1905a0b2547953e210040efd1851acd69a667a6de5d2955b12fd806b544d43b6f6aa9561aad357320d9929051512af1c0a5

  • SSDEEP

    768:DwtiThVTT6E7kRcF//uUUjsji3r4Ov9+Nuph4FCMWsKSzxgHJ:EEVrwc5GUUgjT++CrMDSHJ

Score
10/10

Malware Config

Targets

    • Target

      951ea46c0075499ef18d4b51d67c7bcc4cb6cefae82db68b29d0625d325d0d29

    • Size

      160KB

    • MD5

      e8b7eb90845f2e4667edad25ecfa7488

    • SHA1

      fded98e96a81430d7ee9bf152265686dc41664b7

    • SHA256

      951ea46c0075499ef18d4b51d67c7bcc4cb6cefae82db68b29d0625d325d0d29

    • SHA512

      6d024f5530b8d0049808994dfcbc8de70926f3c18a73dcaf1590b51b721b50db0385cde64c891fb7770c064d8c18577faa810a3738d74e7e9ad4befc922bf32b

    • SSDEEP

      1536:nwXiZJUXWrCcPefYKs6sJUXWrCMPefYKs6ePefYKs66JUXWrCHJUXWrC8:ntIQKs6vQKs6vQKs6h

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks