General

  • Target

    Cisco_Umbrella_Root_CA.cer

  • Size

    1KB

  • Sample

    241226-gqqqjaylfq

  • MD5

    963b7b50c6f11c264e30fda42c431ad6

  • SHA1

    8ae3de215566db897f9fd1e72d54a0672bcfe430

  • SHA256

    a122d4080a26c1da986bd0e7202b1630eb661a624915ef244f496fdd306e85fb

  • SHA512

    9682908dc0eacac512cb9d2249350eebab89efd5f50b35fd134a21a66ef0219380edf28a3f309908f405cdbd672292e707b94475133109a2c5678f8f24306bf5

Score
8/10

Malware Config

Targets

    • Target

      Cisco_Umbrella_Root_CA.cer

    • Size

      1KB

    • MD5

      963b7b50c6f11c264e30fda42c431ad6

    • SHA1

      8ae3de215566db897f9fd1e72d54a0672bcfe430

    • SHA256

      a122d4080a26c1da986bd0e7202b1630eb661a624915ef244f496fdd306e85fb

    • SHA512

      9682908dc0eacac512cb9d2249350eebab89efd5f50b35fd134a21a66ef0219380edf28a3f309908f405cdbd672292e707b94475133109a2c5678f8f24306bf5

    Score
    8/10
    • Blocklisted process makes network request

    • A potential corporate email address has been identified in the URL: [email protected]

MITRE ATT&CK Enterprise v15

Tasks