General
-
Target
OFFER LETTER.docx
-
Size
10KB
-
Sample
210528-xv1rpk8ywa
-
MD5
94acea4fc503e1262d8c08c7122531c7
-
SHA1
dbd4b7c4b7bb18568881cfbea8d214c8b9b720e8
-
SHA256
9e3b9c53eb36e3ed1630f87b369e72c4b03a28802922924a153245b1a5152663
-
SHA512
d4a64286f17acfd63d70958bc3b682db29720b9bf5c1e355e5e10de3e3354995c850fe038d93a732d7d0ebe6123afa6acf23333660c142210f54c2f8558517b9
Static task
static1
Behavioral task
behavioral1
Sample
OFFER LETTER.docx
Resource
win7v20210408
Behavioral task
behavioral2
Sample
OFFER LETTER.docx
Resource
win10v20210410
Malware Config
Extracted
https://cutt.ly/2ntJmOt
Targets
-
-
Target
OFFER LETTER.docx
-
Size
10KB
-
MD5
94acea4fc503e1262d8c08c7122531c7
-
SHA1
dbd4b7c4b7bb18568881cfbea8d214c8b9b720e8
-
SHA256
9e3b9c53eb36e3ed1630f87b369e72c4b03a28802922924a153245b1a5152663
-
SHA512
d4a64286f17acfd63d70958bc3b682db29720b9bf5c1e355e5e10de3e3354995c850fe038d93a732d7d0ebe6123afa6acf23333660c142210f54c2f8558517b9
Score7/10-
Abuses OpenXML format to download file from external location
-