General
-
Target
commerce ,12.09.2020.doc
-
Size
76KB
-
Sample
201210-abktff3w3e
-
MD5
e4ed13e9bb520ca239f22b0975635375
-
SHA1
aecceac8f470893170663aff507e9a93581442f8
-
SHA256
79d039cacf9d5c4011b56709c53de1a8be20010484a69d118ac91fcce6f2c253
-
SHA512
b5320be82f5d2ad1e0192ec6cf6f8821162fb997fab329f373d73df51fe35a5ec648eb3495434658f723fb72e6ac20d6ca28c6bd5700aad9afca0956e49fd881
Static task
static1
Behavioral task
behavioral1
Sample
commerce ,12.09.2020.doc
Resource
win7v20201028
Malware Config
Targets
-
-
Target
commerce ,12.09.2020.doc
-
Size
76KB
-
MD5
e4ed13e9bb520ca239f22b0975635375
-
SHA1
aecceac8f470893170663aff507e9a93581442f8
-
SHA256
79d039cacf9d5c4011b56709c53de1a8be20010484a69d118ac91fcce6f2c253
-
SHA512
b5320be82f5d2ad1e0192ec6cf6f8821162fb997fab329f373d73df51fe35a5ec648eb3495434658f723fb72e6ac20d6ca28c6bd5700aad9afca0956e49fd881
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Loads dropped DLL
-