General
-
Target
dictate,12.07.2020.doc
-
Size
74KB
-
Sample
201207-4w9hwbz6za
-
MD5
5b14a94211accca8f8a1ff5817af10f4
-
SHA1
f52cffebeda9aba7ddea487b71b5b689ab0212f4
-
SHA256
385794d14430b56014a7ec11add05404f0038dc39b6e0f6617c67a13128e176a
-
SHA512
ffb1e76deca20465b5c13999a6fbe5ebcb4fff858aaf7beffb4c08c79704c9623b214000e410b96b478b1edfa19825f0ff1125da68255e3b1bf6432151948d45
Static task
static1
Behavioral task
behavioral1
Sample
dictate,12.07.2020.doc
Resource
win7v20201028
Malware Config
Targets
-
-
Target
dictate,12.07.2020.doc
-
Size
74KB
-
MD5
5b14a94211accca8f8a1ff5817af10f4
-
SHA1
f52cffebeda9aba7ddea487b71b5b689ab0212f4
-
SHA256
385794d14430b56014a7ec11add05404f0038dc39b6e0f6617c67a13128e176a
-
SHA512
ffb1e76deca20465b5c13999a6fbe5ebcb4fff858aaf7beffb4c08c79704c9623b214000e410b96b478b1edfa19825f0ff1125da68255e3b1bf6432151948d45
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Loads dropped DLL
-