General
-
Target
af56714d4d1754000f42f1e8220d1b64
-
Size
420KB
-
Sample
201214-6jbef9lsz2
-
MD5
af56714d4d1754000f42f1e8220d1b64
-
SHA1
e920748f1ac768b0f35c02a6b121fc496412ba6d
-
SHA256
a82c6a23644bfd7b236b737e30582f01e65632b5786fbe6b9c52191eb1eaf714
-
SHA512
b52938dece21877a8924c25d47cdba09ff112a81d96ed046131848485246854b52477c2b6f04fbaee72cd5a3cb053b8fa1cefcd64b85d08bc6140ce80984e3c1
Static task
static1
Behavioral task
behavioral1
Sample
af56714d4d1754000f42f1e8220d1b64.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
af56714d4d1754000f42f1e8220d1b64.doc
Resource
win10v20201028
Malware Config
Targets
-
-
Target
af56714d4d1754000f42f1e8220d1b64
-
Size
420KB
-
MD5
af56714d4d1754000f42f1e8220d1b64
-
SHA1
e920748f1ac768b0f35c02a6b121fc496412ba6d
-
SHA256
a82c6a23644bfd7b236b737e30582f01e65632b5786fbe6b9c52191eb1eaf714
-
SHA512
b52938dece21877a8924c25d47cdba09ff112a81d96ed046131848485246854b52477c2b6f04fbaee72cd5a3cb053b8fa1cefcd64b85d08bc6140ce80984e3c1
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Loads dropped DLL
-