General
-
Target
1125_56873981.doc
-
Size
368KB
-
Sample
201125-6s3n7jcp7s
-
MD5
bdba9e0cbaa81843d8a651ed0098a9fd
-
SHA1
a105d9e6bb732093237bc2d555478c9a8a54bb6d
-
SHA256
827866089f958b9df535168bc3efed843ee0d769cbe015758d90f9199f7b0d25
-
SHA512
327076632a9dbfdfab0f0888a173f71cea1840d7ffa1e5afb825d60af794868db04269f1bfd88055c83bfaccc02ecf2868470bc01e559ab671a85830da4db6ee
Static task
static1
Behavioral task
behavioral1
Sample
1125_56873981.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
1125_56873981.doc
Resource
win10v20201028
Malware Config
Targets
-
-
Target
1125_56873981.doc
-
Size
368KB
-
MD5
bdba9e0cbaa81843d8a651ed0098a9fd
-
SHA1
a105d9e6bb732093237bc2d555478c9a8a54bb6d
-
SHA256
827866089f958b9df535168bc3efed843ee0d769cbe015758d90f9199f7b0d25
-
SHA512
327076632a9dbfdfab0f0888a173f71cea1840d7ffa1e5afb825d60af794868db04269f1bfd88055c83bfaccc02ecf2868470bc01e559ab671a85830da4db6ee
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blacklisted process makes network request
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-