General
-
Target
Info.zip
-
Size
42KB
-
Sample
211021-zees1aaga4
-
MD5
69fca9509a5acadbbf5ff410c8f5a8dd
-
SHA1
a3dc342370fde6a7bda7a15ca3694c25499b8feb
-
SHA256
66f8131b30c926ba68558b4976f46447ea24116c55249e7bcac6dd23a6cb3224
-
SHA512
00bb5b2609e60b95b7ff9702c5d9ff97367613a0b9368874177a128159e373eca1d7fd37409e270d9a6866ef78f8b248abf4182a3af6bd8f9ca280b0bd208e51
Static task
static1
Behavioral task
behavioral1
Sample
certificate.010.21.doc
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
certificate.010.21.doc
Resource
win10-en-20211014
Malware Config
Targets
-
-
Target
certificate.010.21.doc
-
Size
34KB
-
MD5
f58cbc77264954ce63205bdbaee93f25
-
SHA1
3b61d17939067fa6086c09260edd5951cc797e81
-
SHA256
2588782842cfb9bfe76b4516ad66aee020b5f5d90f74a91106840c4491c78cf8
-
SHA512
9e2a98e3418715b37ba02953c75828b85b818a9c140de97f4cc7164ae3a4f00a8537342d38c09051d94dfad0a60b8d7dd3d069a897100d4f1781c8fe012425a4
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-