General
-
Target
1b4fa8201cd3810458494b53b12405a2.doc
-
Size
892KB
-
Sample
211123-yyvg5abber
-
MD5
1b4fa8201cd3810458494b53b12405a2
-
SHA1
77fa859cab2f5509ac367ff753475bd3744f0d77
-
SHA256
bcdcf1ec9bf276c3e6ea441e64ff91fe836857fc49c0c97b672adc0a64aa6873
-
SHA512
ffa139281f0f019ddf4b74963fe47421e0edbff781c9b941938d3bb2eacc8f92b63c328bcbd745201cef221f3536e2b09b122cf3baa423127d2ba122304c9fd7
Static task
static1
Behavioral task
behavioral1
Sample
1b4fa8201cd3810458494b53b12405a2.doc
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
1b4fa8201cd3810458494b53b12405a2.doc
Resource
win10-en-20211104
Malware Config
Extracted
hancitor
2311_nsdir
http://templogio.com/9/forum.php
http://johommeract.ru/9/forum.php
http://amesibiquand.ru/9/forum.php
Targets
-
-
Target
1b4fa8201cd3810458494b53b12405a2.doc
-
Size
892KB
-
MD5
1b4fa8201cd3810458494b53b12405a2
-
SHA1
77fa859cab2f5509ac367ff753475bd3744f0d77
-
SHA256
bcdcf1ec9bf276c3e6ea441e64ff91fe836857fc49c0c97b672adc0a64aa6873
-
SHA512
ffa139281f0f019ddf4b74963fe47421e0edbff781c9b941938d3bb2eacc8f92b63c328bcbd745201cef221f3536e2b09b122cf3baa423127d2ba122304c9fd7
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-