General
-
Target
legislate_010.21.doc
-
Size
70KB
-
Sample
211013-sklp6secbn
-
MD5
61175a4989e7385ced2c1bfc25475fa3
-
SHA1
a483c693d5e6051c424b89a0c5f8dc9b74ddda00
-
SHA256
c59af94345b6590f1027e9e3de115c410972deb01a2e3754aaca9485fda96382
-
SHA512
4dc66db87e84ad33fbe0418e38ec534a35a2b02a6648d5bf49269087a1de49adc12f8ce74bfe0379998148f93288c1c751f217cb47c4630294e8734dbee2e034
Behavioral task
behavioral1
Sample
legislate_010.21.doc
Resource
win7v20210408
Behavioral task
behavioral2
Sample
legislate_010.21.doc
Resource
win10-en-20210920
Malware Config
Targets
-
-
Target
legislate_010.21.doc
-
Size
70KB
-
MD5
61175a4989e7385ced2c1bfc25475fa3
-
SHA1
a483c693d5e6051c424b89a0c5f8dc9b74ddda00
-
SHA256
c59af94345b6590f1027e9e3de115c410972deb01a2e3754aaca9485fda96382
-
SHA512
4dc66db87e84ad33fbe0418e38ec534a35a2b02a6648d5bf49269087a1de49adc12f8ce74bfe0379998148f93288c1c751f217cb47c4630294e8734dbee2e034
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-