General
-
Target
5e1267c7d8ba66773106314b9752b153
-
Size
892KB
-
Sample
211123-vgt89adhf7
-
MD5
5e1267c7d8ba66773106314b9752b153
-
SHA1
6e46f60fa7e0cebc36d9f9ba1ae5a0c20e776da8
-
SHA256
1c9d20896f1c44c2dbbb6bb05979c1ec374d097b9af4d881c0c1949ddc1d821f
-
SHA512
63217a100f5dda72947691aaede20541ccfb792eef961b845b1e6a153767f352290fd45890bfae986c9c1c19a8e783cfd4eb692bae6706aae0a0f741ae2e61bd
Static task
static1
Behavioral task
behavioral1
Sample
5e1267c7d8ba66773106314b9752b153.doc
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
5e1267c7d8ba66773106314b9752b153.doc
Resource
win10-en-20211014
Malware Config
Extracted
hancitor
2311_nsdir
http://templogio.com/9/forum.php
http://johommeract.ru/9/forum.php
http://amesibiquand.ru/9/forum.php
Targets
-
-
Target
5e1267c7d8ba66773106314b9752b153
-
Size
892KB
-
MD5
5e1267c7d8ba66773106314b9752b153
-
SHA1
6e46f60fa7e0cebc36d9f9ba1ae5a0c20e776da8
-
SHA256
1c9d20896f1c44c2dbbb6bb05979c1ec374d097b9af4d881c0c1949ddc1d821f
-
SHA512
63217a100f5dda72947691aaede20541ccfb792eef961b845b1e6a153767f352290fd45890bfae986c9c1c19a8e783cfd4eb692bae6706aae0a0f741ae2e61bd
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-