General
-
Target
charge-12.20.doc
-
Size
90KB
-
Sample
201210-sdk1m4lsra
-
MD5
76197f6d42cd64acde1972d4a52ae82d
-
SHA1
71654b1ae3657a9f18b97fd7a26cfda4e67b0988
-
SHA256
55d904b83f04acb4118df9b2bd3ebbd44b9553b0aabcfff7b68d674ddb6052cc
-
SHA512
c7f2c95d6f02885403c88f549f14ee8fd8efde905f8b42362857b0c8c9f83e7b4bbe09f7933184f931049aba25d1112bac6fd488f95eebc94b75badc09cf3b8c
Static task
static1
Behavioral task
behavioral1
Sample
charge-12.20.doc
Resource
win7v20201028
Malware Config
Targets
-
-
Target
charge-12.20.doc
-
Size
90KB
-
MD5
76197f6d42cd64acde1972d4a52ae82d
-
SHA1
71654b1ae3657a9f18b97fd7a26cfda4e67b0988
-
SHA256
55d904b83f04acb4118df9b2bd3ebbd44b9553b0aabcfff7b68d674ddb6052cc
-
SHA512
c7f2c95d6f02885403c88f549f14ee8fd8efde905f8b42362857b0c8c9f83e7b4bbe09f7933184f931049aba25d1112bac6fd488f95eebc94b75badc09cf3b8c
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Loads dropped DLL
-