General
-
Target
docs.11.20.doc
-
Size
142KB
-
Sample
201130-k545cfw2qe
-
MD5
890fb20620c85b7c1d83453adb10f315
-
SHA1
3668152ac9d6a18e9b5c6768ae04f7ee89fa0290
-
SHA256
68c8650b6fb677494afb0403752f15b92351fa9cf56fd7a9ac7686f63d7930fc
-
SHA512
6097814f9d7a83c6d14e15f34c4aaede7a0e4f4d0f0afa634022377bbc4b33ee392e2fa53986e59e863d92da4b0a13d1f9823350366ad7b1f6898f70a5e31d9b
Static task
static1
Behavioral task
behavioral1
Sample
docs.11.20.doc
Resource
win7v20201028
Malware Config
Targets
-
-
Target
docs.11.20.doc
-
Size
142KB
-
MD5
890fb20620c85b7c1d83453adb10f315
-
SHA1
3668152ac9d6a18e9b5c6768ae04f7ee89fa0290
-
SHA256
68c8650b6fb677494afb0403752f15b92351fa9cf56fd7a9ac7686f63d7930fc
-
SHA512
6097814f9d7a83c6d14e15f34c4aaede7a0e4f4d0f0afa634022377bbc4b33ee392e2fa53986e59e863d92da4b0a13d1f9823350366ad7b1f6898f70a5e31d9b
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Loads dropped DLL
-