General
-
Target
file.zip
-
Size
85KB
-
Sample
210113-445be74q22
-
MD5
93aa944fb76975eaf03523992708e4c0
-
SHA1
26d96ac96c317bf25110ec1b25562b815f1388f1
-
SHA256
96ef22d0fa09843e38b4384fba40b9e057d05fe9d9cf777208becb3c95a808a9
-
SHA512
0e70fa45da2d8dff461ae9168298130f329646ce841a0505bebd2afc70f5a52f736429fbb7baf2510bff12bb90f94d253e1228d11f91c41edbf3b212fa42a985
Static task
static1
Behavioral task
behavioral1
Sample
file.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
file.doc
Resource
win10v20201028
Malware Config
Extracted
http://ketorecipesfit.com/wp-admin/afanv/
http://mertelofis.com/wp-content/As0/
http://givingthanksdaily.com/CP/
http://datawyse.net/0X3QY/
http://cs.lcxxny.com/wp-includes/E3U8nn/
http://makiyazhdoma.ru/blocked/tgEeW8M/
http://trustseal.enamad.ir.redshopfa.com/admit/wJJvvG/
Targets
-
-
Target
file.doc
-
Size
159KB
-
MD5
91d36bdc24320509824ce981e2b947a1
-
SHA1
68efe300bc46a826218fcb9c48020d4fdb1328f1
-
SHA256
b2bf6fd741c90c1f70e56a46a458aad5889596863ff687083039e9a2afcd6c09
-
SHA512
df701cf581514eba7d7b85df13f793a5df52fd885c29debfae51fe2e27aa8766ef815747a88d43d620bf2effb0fab05ecfbb158b17ae910bc7e50c35feac7138
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Drops file in System32 directory
-