General
-
Target
0112_80556334.doc
-
Size
733KB
-
Sample
210112-fqpdp6gc5a
-
MD5
f19210159bc8c2f4cae3dc7cd188aff2
-
SHA1
15b1d8358e35998994795e747200a0c0ca39d889
-
SHA256
51dd023b55be138ac7cfe7379a55c0a2a46c01cd3b3f96a151b0a27ed9e12485
-
SHA512
2dea523fad7e6d772d708f39cb9356e59b9a1a7a687cefbcbfd4f68b40059638b0d9cdea2d1a71c48dbc5db78b4c3cde2e9e8fd1bd4823d26b6493cdd8218069
Static task
static1
Behavioral task
behavioral1
Sample
0112_80556334.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
0112_80556334.doc
Resource
win10v20201028
Malware Config
Targets
-
-
Target
0112_80556334.doc
-
Size
733KB
-
MD5
f19210159bc8c2f4cae3dc7cd188aff2
-
SHA1
15b1d8358e35998994795e747200a0c0ca39d889
-
SHA256
51dd023b55be138ac7cfe7379a55c0a2a46c01cd3b3f96a151b0a27ed9e12485
-
SHA512
2dea523fad7e6d772d708f39cb9356e59b9a1a7a687cefbcbfd4f68b40059638b0d9cdea2d1a71c48dbc5db78b4c3cde2e9e8fd1bd4823d26b6493cdd8218069
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-