General
-
Target
0211_54092248132681.doc
-
Size
332KB
-
Sample
210211-mpml92m686
-
MD5
488a65d8f5675c2489c93282964d0e33
-
SHA1
f5500e1f3fd640b6a92cded055d34241f3a1afb6
-
SHA256
762fdd5227b61802201fc081a28feb0c486908beb2e1fe56123b65fc851bcf66
-
SHA512
a7dece421dd939966f9983633863cfe674a37ffd9fd6d4caf9e8a063727950c5c5ceba3666d222ab09b832211a5e64c4fa0c2e77aec1dd13bf7a19d5a4008f8d
Static task
static1
Behavioral task
behavioral1
Sample
0211_54092248132681.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
0211_54092248132681.doc
Resource
win10v20201028
Malware Config
Extracted
hancitor
1102_heid89
http://nuencres.com/8/forum.php
http://matuattheires.ru/8/forum.php
http://desuctoette.ru/8/forum.php
Targets
-
-
Target
0211_54092248132681.doc
-
Size
332KB
-
MD5
488a65d8f5675c2489c93282964d0e33
-
SHA1
f5500e1f3fd640b6a92cded055d34241f3a1afb6
-
SHA256
762fdd5227b61802201fc081a28feb0c486908beb2e1fe56123b65fc851bcf66
-
SHA512
a7dece421dd939966f9983633863cfe674a37ffd9fd6d4caf9e8a063727950c5c5ceba3666d222ab09b832211a5e64c4fa0c2e77aec1dd13bf7a19d5a4008f8d
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Modifies WinLogon to allow AutoLogon
Enables rebooting of the machine without requiring login credentials.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-