General
-
Target
deed contract.12.20.doc
-
Size
95KB
-
Sample
201214-7vjprst1ra
-
MD5
2978b0f5ac8aa0ae57c07945f3688bf4
-
SHA1
8668a15c75e4d372f59fe80fc5a48985ecedccec
-
SHA256
1036fe653636af27b30a541d77d2d13f96fc373abd6100e36dc13a35e4c80532
-
SHA512
e8ee0f7f8ff3e7cd5774bef94d874011de9bdb2bf2cc4a105a525b0f4f7cc4fffe37a0b17efbbe13e4cd3505fe2b6a99a8f85d923de4e9aa4e13aeab6434b864
Static task
static1
Behavioral task
behavioral1
Sample
deed contract.12.20.doc
Resource
win7v20201028
Malware Config
Targets
-
-
Target
deed contract.12.20.doc
-
Size
95KB
-
MD5
2978b0f5ac8aa0ae57c07945f3688bf4
-
SHA1
8668a15c75e4d372f59fe80fc5a48985ecedccec
-
SHA256
1036fe653636af27b30a541d77d2d13f96fc373abd6100e36dc13a35e4c80532
-
SHA512
e8ee0f7f8ff3e7cd5774bef94d874011de9bdb2bf2cc4a105a525b0f4f7cc4fffe37a0b17efbbe13e4cd3505fe2b6a99a8f85d923de4e9aa4e13aeab6434b864
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Loads dropped DLL
-