General
-
Target
legal paper_12.09.2020.doc
-
Size
90KB
-
Sample
201210-lbz67pz8f2
-
MD5
c85bf39939508b985c107fbb6b759ca0
-
SHA1
794e776c6bdc0301df5e8c07b30b87eaa5a787c0
-
SHA256
c8a23fdac88331fe7aaf6c8bf7002a20dd37371c3a1662fc7c8c30a265b33cde
-
SHA512
273b681eb33547d056743d7bd4965d0b6b5cbdc01724f73f6bc425b64891d0d4c9f7bb4a13128cf23e73b6803e1f518183467dfb9d30dfd980e9097e7ca2aa8a
Static task
static1
Behavioral task
behavioral1
Sample
legal paper_12.09.2020.doc
Resource
win7v20201028
Malware Config
Targets
-
-
Target
legal paper_12.09.2020.doc
-
Size
90KB
-
MD5
c85bf39939508b985c107fbb6b759ca0
-
SHA1
794e776c6bdc0301df5e8c07b30b87eaa5a787c0
-
SHA256
c8a23fdac88331fe7aaf6c8bf7002a20dd37371c3a1662fc7c8c30a265b33cde
-
SHA512
273b681eb33547d056743d7bd4965d0b6b5cbdc01724f73f6bc425b64891d0d4c9f7bb4a13128cf23e73b6803e1f518183467dfb9d30dfd980e9097e7ca2aa8a
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Loads dropped DLL
-