General
-
Target
0204_170387664101931.doc
-
Size
365KB
-
Sample
210204-z2ywjrp4ea
-
MD5
afdabb0054f015084c55a446118e3473
-
SHA1
990487f1398d3fe950e38d20ca3f5d271ac7abf9
-
SHA256
7cf248bdae62a6ff5bbc41566eba5c85b3eaf6f5b22cdf46e56d2cb63a69ccba
-
SHA512
017d5efb60342835c17b563a8499b13f5f4eb1232db33acd31caa076e31f62539867765891ccd88503a1bc2727c36b4a5fcf7d33242096b656182878982b097e
Static task
static1
Behavioral task
behavioral1
Sample
0204_170387664101931.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
0204_170387664101931.doc
Resource
win10v20201028
Malware Config
Extracted
hancitor
0402_pogi
http://feirecropl.com/8/forum.php
http://oresteseu.ru/8/forum.php
http://respoishis.ru/8/forum.php
Targets
-
-
Target
0204_170387664101931.doc
-
Size
365KB
-
MD5
afdabb0054f015084c55a446118e3473
-
SHA1
990487f1398d3fe950e38d20ca3f5d271ac7abf9
-
SHA256
7cf248bdae62a6ff5bbc41566eba5c85b3eaf6f5b22cdf46e56d2cb63a69ccba
-
SHA512
017d5efb60342835c17b563a8499b13f5f4eb1232db33acd31caa076e31f62539867765891ccd88503a1bc2727c36b4a5fcf7d33242096b656182878982b097e
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation