General
-
Target
Z15L.doc
-
Size
18KB
-
Sample
200713-lbmhj2emha
-
MD5
f93b93eb344857843ad3e96c5f50ebab
-
SHA1
fe06bd6cafa83defed720c2b76679f23b3f68dd5
-
SHA256
77d445a597d3a66104b78fbffd7f90c9a141f42f9c47c7fbef1e4340f1652122
-
SHA512
0131653ec51d113b782d06f339d2c342505db759103ed3bcb7198dcc0803d2af2801afcd9d5c1ea33ee2f562936f117ad1a670d2384bb2ffc921a70c3f6d8ecd
Static task
static1
Behavioral task
behavioral1
Sample
Z15L.doc
Resource
win7
Behavioral task
behavioral2
Sample
Z15L.doc
Resource
win10v200430
Malware Config
Targets
-
-
Target
Z15L.doc
-
Size
18KB
-
MD5
f93b93eb344857843ad3e96c5f50ebab
-
SHA1
fe06bd6cafa83defed720c2b76679f23b3f68dd5
-
SHA256
77d445a597d3a66104b78fbffd7f90c9a141f42f9c47c7fbef1e4340f1652122
-
SHA512
0131653ec51d113b782d06f339d2c342505db759103ed3bcb7198dcc0803d2af2801afcd9d5c1ea33ee2f562936f117ad1a670d2384bb2ffc921a70c3f6d8ecd
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blacklisted process makes network request
-
Drops file in System32 directory
-