General
-
Target
f030d9ec0067ad5dc4e908773e33e0cdedad6a70dfe9ad1668f8f948cfcbddf2.doc
-
Size
152KB
-
Sample
200127-cn5e3avk66
-
MD5
516641cd5f6a69f06cdaa335a463361d
-
SHA1
546f36bb0dc7d0a2153d5649c7e337fe44edcad0
-
SHA256
f030d9ec0067ad5dc4e908773e33e0cdedad6a70dfe9ad1668f8f948cfcbddf2
-
SHA512
365b2bfc607ee8037599ea2a00e6d49ad1b25e75f2084760376f27687a3d80638998073c782e8ad0c00dc9ea72f8eb08c62a5b3663eb4198dd5894e1ec0cbf3c
Task
task1
Sample
f030d9ec0067ad5dc4e908773e33e0cdedad6a70dfe9ad1668f8f948cfcbddf2.doc
Resource
win10v191014
Malware Config
Extracted
http://yochina.apps.zeroek.com/assets/GQK9Gly/
http://www.bandarwinsbobet.com/wp-admin/7bw/
http://test.pakspaservices.com/wp-content/Yi1j6O7/
http://portal.meucompromisso.com/wp-admin/kQJ/
https://wondersofgeorgia.com/wp-admin/jv7hvg/
Targets
-
-
Target
f030d9ec0067ad5dc4e908773e33e0cdedad6a70dfe9ad1668f8f948cfcbddf2.doc
-
Size
152KB
-
MD5
516641cd5f6a69f06cdaa335a463361d
-
SHA1
546f36bb0dc7d0a2153d5649c7e337fe44edcad0
-
SHA256
f030d9ec0067ad5dc4e908773e33e0cdedad6a70dfe9ad1668f8f948cfcbddf2
-
SHA512
365b2bfc607ee8037599ea2a00e6d49ad1b25e75f2084760376f27687a3d80638998073c782e8ad0c00dc9ea72f8eb08c62a5b3663eb4198dd5894e1ec0cbf3c
Score10/10-
Process spawned unexpected child process
-
Executes dropped EXE
-