General
-
Target
legislate,11.20.doc
-
Size
108KB
-
Sample
201130-scvkzddh42
-
MD5
38ccfcd8c1d013c41392100a16b11eaf
-
SHA1
53d90fa7c5e1052062de803d73758756ef75f379
-
SHA256
611e80332043d9a050383da839c46bdd8b456f955cdfdea90f8cdfe14277ae69
-
SHA512
ce54ac7a998e3c3ff69738a7c9195defebda8fbd2dc6e60d96d6d8655e39407c2a789bfdcd60c92942145319496c9ae875dfae72743cdaf6b01117af2192e1d4
Static task
static1
Behavioral task
behavioral1
Sample
legislate,11.20.doc
Resource
win7v20201028
Malware Config
Targets
-
-
Target
legislate,11.20.doc
-
Size
108KB
-
MD5
38ccfcd8c1d013c41392100a16b11eaf
-
SHA1
53d90fa7c5e1052062de803d73758756ef75f379
-
SHA256
611e80332043d9a050383da839c46bdd8b456f955cdfdea90f8cdfe14277ae69
-
SHA512
ce54ac7a998e3c3ff69738a7c9195defebda8fbd2dc6e60d96d6d8655e39407c2a789bfdcd60c92942145319496c9ae875dfae72743cdaf6b01117af2192e1d4
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Loads dropped DLL
-