General
-
Target
decree 06.21.doc
-
Size
45KB
-
Sample
210610-e8awzvkmm2
-
MD5
46e887ac0d356a30dc8a9971d9486dbe
-
SHA1
60468618a0e2e4d815af07e8652fba0437ddc5e6
-
SHA256
83439db58d913186b422724bea2ed8d674956e8f1c2b3f00dc6c8b91d60ffdba
-
SHA512
83a59a9afb67d5e4f9f49938df7a496839cda47d425b74405052ddc864a480efb4dfd0a55847e5dbe866762cc9f10210fa23cd5a8a40a06b2a0b002fff916d63
Static task
static1
Behavioral task
behavioral1
Sample
decree 06.21.doc
Resource
win7v20210410
Behavioral task
behavioral2
Sample
decree 06.21.doc
Resource
win10v20210408
Malware Config
Extracted
gozi_ifsb
6000
authd.feronok.com
app.bighomegl.at
-
build
250204
-
exe_type
loader
-
server_id
580
Targets
-
-
Target
decree 06.21.doc
-
Size
45KB
-
MD5
46e887ac0d356a30dc8a9971d9486dbe
-
SHA1
60468618a0e2e4d815af07e8652fba0437ddc5e6
-
SHA256
83439db58d913186b422724bea2ed8d674956e8f1c2b3f00dc6c8b91d60ffdba
-
SHA512
83a59a9afb67d5e4f9f49938df7a496839cda47d425b74405052ddc864a480efb4dfd0a55847e5dbe866762cc9f10210fa23cd5a8a40a06b2a0b002fff916d63
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Loads dropped DLL
-