General
-
Target
AGENCY APPOINTMENT MV APPOLLO MEO 30000MT OF STEEL BARS.docm
-
Size
14KB
-
Sample
210311-gczhaenx8e
-
MD5
a97a1ed3f0ae65d59ff8224543a7daea
-
SHA1
14e9cc3489b566173ed6e5a9dc0d1d0442066b60
-
SHA256
7a5e7acc630e80be187a97fba6037caa36056c12e0f11299d6ee55bed6141fe6
-
SHA512
08ff34debf744c1ad20ef758aaf74fc6ecb4c86ff6b3e3e4d2fde721054a67163750ab774e7ad4bc699dfcbe187a766140cd88b16992bb7979781ab3f09864e3
Static task
static1
Behavioral task
behavioral1
Sample
AGENCY APPOINTMENT MV APPOLLO MEO 30000MT OF STEEL BARS.docm
Resource
win7v20201028
Behavioral task
behavioral2
Sample
AGENCY APPOINTMENT MV APPOLLO MEO 30000MT OF STEEL BARS.docm
Resource
win10v20201028
Malware Config
Targets
-
-
Target
AGENCY APPOINTMENT MV APPOLLO MEO 30000MT OF STEEL BARS.docm
-
Size
14KB
-
MD5
a97a1ed3f0ae65d59ff8224543a7daea
-
SHA1
14e9cc3489b566173ed6e5a9dc0d1d0442066b60
-
SHA256
7a5e7acc630e80be187a97fba6037caa36056c12e0f11299d6ee55bed6141fe6
-
SHA512
08ff34debf744c1ad20ef758aaf74fc6ecb4c86ff6b3e3e4d2fde721054a67163750ab774e7ad4bc699dfcbe187a766140cd88b16992bb7979781ab3f09864e3
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-