General
-
Target
5e0ce9e9f2697d96cbc5573494702c5049f097c173d2bffba28ed4487d759e4c.doc
-
Size
152KB
-
Sample
200127-gmsklar3pa
-
MD5
e698949b0cdb6c2f5a8bd8e82628f16b
-
SHA1
49d305ab0d535de58ea3c569fee8344fc3c2e968
-
SHA256
5e0ce9e9f2697d96cbc5573494702c5049f097c173d2bffba28ed4487d759e4c
-
SHA512
393afaf856b33232f730b93f46493140762ba5bdbed4821a22b6b927d1c464ef66d0cc3551e7b5b984273d40ad60f1a07e858a229961d7f26d8e0b77e282742f
Task
task1
Sample
5e0ce9e9f2697d96cbc5573494702c5049f097c173d2bffba28ed4487d759e4c.doc
Resource
win10v191014
Malware Config
Extracted
http://yochina.apps.zeroek.com/assets/GQK9Gly/
http://www.bandarwinsbobet.com/wp-admin/7bw/
http://test.pakspaservices.com/wp-content/Yi1j6O7/
http://portal.meucompromisso.com/wp-admin/kQJ/
https://wondersofgeorgia.com/wp-admin/jv7hvg/
Targets
-
-
Target
5e0ce9e9f2697d96cbc5573494702c5049f097c173d2bffba28ed4487d759e4c.doc
-
Size
152KB
-
MD5
e698949b0cdb6c2f5a8bd8e82628f16b
-
SHA1
49d305ab0d535de58ea3c569fee8344fc3c2e968
-
SHA256
5e0ce9e9f2697d96cbc5573494702c5049f097c173d2bffba28ed4487d759e4c
-
SHA512
393afaf856b33232f730b93f46493140762ba5bdbed4821a22b6b927d1c464ef66d0cc3551e7b5b984273d40ad60f1a07e858a229961d7f26d8e0b77e282742f
Score10/10-
Process spawned unexpected child process
-
Executes dropped EXE
-