General
-
Target
dictate-010.21.doc
-
Size
34KB
-
Sample
211021-w4t3fabeel
-
MD5
27c6e3a95419811dade0a91336ed78ba
-
SHA1
1cb11df53cb076607bb6c3aac65c9efd7238e5c0
-
SHA256
aa8f2b060e929883fab4209f54d43b5c7ac75d98926180a61c13eca889cddeb3
-
SHA512
d83ff89f2a06d0ee3913bad17262cf0bcacdc9a1147592458e7ba79dc63a9a592ea5d1e12c3c96d15d55bfe435eb015a12a019c0114a318733d5508ca3f8f0c9
Static task
static1
Behavioral task
behavioral1
Sample
dictate-010.21.doc
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
dictate-010.21.doc
Resource
win10-en-20211014
Malware Config
Targets
-
-
Target
dictate-010.21.doc
-
Size
34KB
-
MD5
27c6e3a95419811dade0a91336ed78ba
-
SHA1
1cb11df53cb076607bb6c3aac65c9efd7238e5c0
-
SHA256
aa8f2b060e929883fab4209f54d43b5c7ac75d98926180a61c13eca889cddeb3
-
SHA512
d83ff89f2a06d0ee3913bad17262cf0bcacdc9a1147592458e7ba79dc63a9a592ea5d1e12c3c96d15d55bfe435eb015a12a019c0114a318733d5508ca3f8f0c9
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-