General
-
Target
legislate,12.07.2020.doc
-
Size
76KB
-
Sample
201207-8twwjjm28a
-
MD5
b23c60eac13df90a50ebf0521a1bb1de
-
SHA1
bde39149016d4590565e7719fb5c40756c97385b
-
SHA256
ea85265f62418bd9f42f8fe23454517503eb7e29bc267a4e6526df8618c9039b
-
SHA512
d85e2667ce71d414768aba5d6a8e8a3e5bd73d286eed036ec8d142cdd19a2e37ad173ac18667a52dd614d7d5293e6a060bd5269a83e9f7a20970adea0bc11967
Static task
static1
Behavioral task
behavioral1
Sample
legislate,12.07.2020.doc
Resource
win7v20201028
Malware Config
Targets
-
-
Target
legislate,12.07.2020.doc
-
Size
76KB
-
MD5
b23c60eac13df90a50ebf0521a1bb1de
-
SHA1
bde39149016d4590565e7719fb5c40756c97385b
-
SHA256
ea85265f62418bd9f42f8fe23454517503eb7e29bc267a4e6526df8618c9039b
-
SHA512
d85e2667ce71d414768aba5d6a8e8a3e5bd73d286eed036ec8d142cdd19a2e37ad173ac18667a52dd614d7d5293e6a060bd5269a83e9f7a20970adea0bc11967
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Loads dropped DLL
-