General
-
Target
481372f202731e023aa7be587ee7be16039ada6790059f87ea72ff7e81d0d7fb.doc
-
Size
123KB
-
Sample
200130-nh27egna7j
-
MD5
e3e856167b4c0b4d5d15df01c8cba6b2
-
SHA1
cb73e732dc43bf78a0928e0005831cdfd4bb8ef3
-
SHA256
481372f202731e023aa7be587ee7be16039ada6790059f87ea72ff7e81d0d7fb
-
SHA512
b515a590ab1618877513be1435b6c4e9451123994a111126e8f4419053250b600ded6d28800fc53ea8c0e4371abdd8df0da304a9548a38cf672effbfb500645f
Task
task1
Sample
481372f202731e023aa7be587ee7be16039ada6790059f87ea72ff7e81d0d7fb.doc
Resource
win10v191014
Malware Config
Extracted
http://srisurena.com/trademark/c553c/
http://nexsolgen.com/c8tsz30/pzby/
http://vedanshsoft.com/eqnar/ftoms/
http://svrealtors.com/billing/p9oa/
https://wiwidwinar.com/crozjui/jFXJnJp7lD/
Targets
-
-
Target
481372f202731e023aa7be587ee7be16039ada6790059f87ea72ff7e81d0d7fb.doc
-
Size
123KB
-
MD5
e3e856167b4c0b4d5d15df01c8cba6b2
-
SHA1
cb73e732dc43bf78a0928e0005831cdfd4bb8ef3
-
SHA256
481372f202731e023aa7be587ee7be16039ada6790059f87ea72ff7e81d0d7fb
-
SHA512
b515a590ab1618877513be1435b6c4e9451123994a111126e8f4419053250b600ded6d28800fc53ea8c0e4371abdd8df0da304a9548a38cf672effbfb500645f
Score10/10-
Process spawned unexpected child process
-
Executes dropped EXE
-