General
-
Target
GreenwoodApt_2021-03-09_11 36 57.zip
-
Size
50KB
-
Sample
210309-kdba46tm2n
-
MD5
9a910aa50bbbafd5a168365f2522f8a2
-
SHA1
83a715be28c118af37052d36882d9736c1fdb4c3
-
SHA256
e8ec3c800918f4bf63495f27156ff61e1199b3cce848a83b414dee46f1535cdc
-
SHA512
4fccf9ef92d2548be62f7bb2a77001eb727c34e5aaf04c856c9e0c9735ad9302b95ed8a8911132fd0b0fbec3c5ff26cee6cbcf00bd614e820b013b9d0eec1ba2
Static task
static1
Behavioral task
behavioral1
Sample
Device/HarddiskVolume2/Users/user/Downloads/Attachments 19 G06979262.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Device/HarddiskVolume2/Users/user/Downloads/Attachments 19 G06979262.doc
Resource
win10v20201028
Malware Config
Extracted
http://urbandogscol.com/wp-content/xiqjp4/
http://spidersheet.com/wp-includes/js/swfupload/k0924/
http://artoftribalindia.com/wp-content/uploads/r74d6u4/
https://navinfamilywines.com/alloldfiles.zip/zegkb671/
https://gabisan-shipping.com/n4mf/syz49i21/
Targets
-
-
Target
Device/HarddiskVolume2/Users/user/Downloads/Attachments 19 G06979262.doc
-
Size
87KB
-
MD5
68fdeafc7361bbc3321f3828e902cda6
-
SHA1
7abacfccb89a75f3faef70b8fc3963eb7bd647c8
-
SHA256
1ab055b3121ec3823a0a3002eb1fe8f48d5c7f04d9f0e92496165fb2cc1ec9c2
-
SHA512
340a5ecf9c17cb3798c8e473c9e20297e4dbdf5e85d1acc87daae4f54a34eb76adc288bf76e5efb70ad6f6343033446654a7dd5a6fbe32b62c365410c6f0f4fc
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-