General

  • Target

    2a2535ac7f5a81a82f4506f95ce0bb122af037dce0c62dbd9d3d8068d0db764c

  • Size

    44KB

  • Sample

    241221-sqbr6a1rcw

  • MD5

    8f40d9f1c6dc376112989033af5c6548

  • SHA1

    ca2b75bcbd081745b670959e2e088c7e57842cd3

  • SHA256

    94353391fb38acd6e59f5559641efa44dd7f1da748cb0782e95f19c3e127a1e5

  • SHA512

    4c88f6b5dd91944e0fbc18ef9d5e31d228480f2d36dae98a25027d481bad252b61825491c9470c956eea3648ead6a5bd7db2071217da51d6ce2f9231f3583c39

  • SSDEEP

    768:UTBsQdF4xwRwY4GxLqXWdJO/z9qcycHMIiNIFEWYeTJ32oX04G77MiZ07x:0DkWCY3xmW69BH2rWdTJ3rkR7nmx

Score
10/10

Malware Config

Targets

    • Target

      2a2535ac7f5a81a82f4506f95ce0bb122af037dce0c62dbd9d3d8068d0db764c

    • Size

      186KB

    • MD5

      f8cc29947420ead6b41047923c889282

    • SHA1

      54b5cd5dd0247d2bbd29edd6dc532f78ceb4741a

    • SHA256

      2a2535ac7f5a81a82f4506f95ce0bb122af037dce0c62dbd9d3d8068d0db764c

    • SHA512

      2200b68bfca73feeb17c086aa931040d7a879fc8f6c4fac431b2f6e6bc0665f72608b2a506dd12c1523970532d0094573231bfb767d392252159ba20982f0ea1

    • SSDEEP

      3072:nRvNtkiCga5CdZ1NtkiCBa5CdZ+a5CdZDNtkiCgNtkiCL:RlttdZXt4dZEdZZt3tw

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks