General
-
Target
8a402f556f7c77b1266072bed81954dc4747f444c131aeac73de34cd30cd9ddc
-
Size
173KB
-
Sample
210122-hmz7vmq5qj
-
MD5
1fb7f64e4011e46ab434e6332185758a
-
SHA1
ddef6d36856468b8c56d6ad4cd4dac18e3468754
-
SHA256
8a402f556f7c77b1266072bed81954dc4747f444c131aeac73de34cd30cd9ddc
-
SHA512
03ba5e2594c369b5b665e3010cfdc8042f5cce206c7c6c5f80e982f258fc4781a221db2dd1800d04d4f94dca561c2a6a501b42d53361d4b7c3c6e769cd25afc2
Behavioral task
behavioral1
Sample
8a402f556f7c77b1266072bed81954dc4747f444c131aeac73de34cd30cd9ddc.doc
Resource
win10v20201028
Malware Config
Extracted
http://coworkingplus.es/wp-admin/FxmME/
http://silkonbusiness.matrixinfotechsolution.com/js/q26/
https://bbjugueteria.com/s6kscx/Z/
https://www.bimception.com/wp-admin/sHy5t/
http://armakonarms.com/wp-includes/fz/
http://alugrama.com.mx/t/2/
http://homecass.com/wp-content/iF/
Targets
-
-
Target
8a402f556f7c77b1266072bed81954dc4747f444c131aeac73de34cd30cd9ddc
-
Size
173KB
-
MD5
1fb7f64e4011e46ab434e6332185758a
-
SHA1
ddef6d36856468b8c56d6ad4cd4dac18e3468754
-
SHA256
8a402f556f7c77b1266072bed81954dc4747f444c131aeac73de34cd30cd9ddc
-
SHA512
03ba5e2594c369b5b665e3010cfdc8042f5cce206c7c6c5f80e982f258fc4781a221db2dd1800d04d4f94dca561c2a6a501b42d53361d4b7c3c6e769cd25afc2
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Enumerates physical storage devices
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-