General
-
Target
0112_153569242.doc
-
Size
735KB
-
Sample
210112-6v26snkzge
-
MD5
e16bb7d07d3edae43d278bf40c39f410
-
SHA1
29f9b366b9c92c9c621fbeba372ae6c6a4723fa4
-
SHA256
d6755718c70e20345c85d18c5411b67c99da5b2f8740d63221038c1d35ccc0b8
-
SHA512
547229c4990a3b0162cd6cef216e923da514611a103f1798d7f7381b13e47f8d0e6c8e401902c4ba8805e89ca7198919a1294fe61257d33161612cfefbc95088
Static task
static1
Behavioral task
behavioral1
Sample
0112_153569242.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
0112_153569242.doc
Resource
win10v20201028
Malware Config
Targets
-
-
Target
0112_153569242.doc
-
Size
735KB
-
MD5
e16bb7d07d3edae43d278bf40c39f410
-
SHA1
29f9b366b9c92c9c621fbeba372ae6c6a4723fa4
-
SHA256
d6755718c70e20345c85d18c5411b67c99da5b2f8740d63221038c1d35ccc0b8
-
SHA512
547229c4990a3b0162cd6cef216e923da514611a103f1798d7f7381b13e47f8d0e6c8e401902c4ba8805e89ca7198919a1294fe61257d33161612cfefbc95088
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-