General
-
Target
document.doc
-
Size
75KB
-
Sample
210311-e4l8eqtx56
-
MD5
094268e03ab9e2e23f0d24554cb81a1b
-
SHA1
3ff029fa49f48408e332c6de54d97d8a43513a5a
-
SHA256
b6585c308bac3649bba3aba216a3be2e76b0593f03a623ed4bd1fa1dde2b1c4f
-
SHA512
f9868abc757464fd0f3d43969c532558167edcaa8c92a36e987f9ad37370eb7dd0a2e18e7acca00ce20d714ac9f7237f967e3094d3451fb357632ea5c9867635
Static task
static1
Behavioral task
behavioral1
Sample
document.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
document.doc
Resource
win10v20201028
Malware Config
Extracted
http://m6147keeganpw.info/sp282y/si2s81-19.php?l=rwoq3.dat
Targets
-
-
Target
document.doc
-
Size
75KB
-
MD5
094268e03ab9e2e23f0d24554cb81a1b
-
SHA1
3ff029fa49f48408e332c6de54d97d8a43513a5a
-
SHA256
b6585c308bac3649bba3aba216a3be2e76b0593f03a623ed4bd1fa1dde2b1c4f
-
SHA512
f9868abc757464fd0f3d43969c532558167edcaa8c92a36e987f9ad37370eb7dd0a2e18e7acca00ce20d714ac9f7237f967e3094d3451fb357632ea5c9867635
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-