General
-
Target
malware.malware
-
Size
706KB
-
Sample
200214-waqz6qr7l6
-
MD5
630980a8bb7a5212dcc1d16fc1fd5e71
-
SHA1
2f19214d0ac4534be9f33824aad3260a3bfd58f0
-
SHA256
480b1ea3a8398cd33681e93114729de81533bdf82e8c02fd4580a0ae2b06681c
-
SHA512
bcdeadcdbf395f9b4695cc663d1a3f1361ed8a20b8e2786141e090f5f9856645b54cfa76a53ed283c7b443d083c0b7e513e4f94a550b21a915099a327adc4f83
Static task
static1
Behavioral task
behavioral1
Sample
malware.malware.doc
Resource
win7v200213
Behavioral task
behavioral2
Sample
malware.malware.doc
Resource
win10v191014
Malware Config
Targets
-
-
Target
malware.malware
-
Size
706KB
-
MD5
630980a8bb7a5212dcc1d16fc1fd5e71
-
SHA1
2f19214d0ac4534be9f33824aad3260a3bfd58f0
-
SHA256
480b1ea3a8398cd33681e93114729de81533bdf82e8c02fd4580a0ae2b06681c
-
SHA512
bcdeadcdbf395f9b4695cc663d1a3f1361ed8a20b8e2786141e090f5f9856645b54cfa76a53ed283c7b443d083c0b7e513e4f94a550b21a915099a327adc4f83
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-