General
-
Target
5c2972a5491e6d8209aa42964c99ad4f8621686005fbc5e1836b4b18d165a888
-
Size
113KB
-
Sample
220112-c9k7yaagb3
-
MD5
7b10abef408978ea69c704e29e2e797a
-
SHA1
d5cec5db6eacae468496669bb602195e1d5b5cbd
-
SHA256
5c2972a5491e6d8209aa42964c99ad4f8621686005fbc5e1836b4b18d165a888
-
SHA512
ca797e6b8bb612dd4e94c36cf7f8f846014ec2b4884949c9b4d9e2901273930a0c5fc3a82ad0135226886e1e266f0afff4b051fe9a4fb8d018d4526e15c38a02
Behavioral task
behavioral1
Sample
5c2972a5491e6d8209aa42964c99ad4f8621686005fbc5e1836b4b18d165a888.xls
Resource
win10-en-20211208
Behavioral task
behavioral2
Sample
5c2972a5491e6d8209aa42964c99ad4f8621686005fbc5e1836b4b18d165a888.xls
Resource
win10-en-20211208
Malware Config
Extracted
http://ordinateur.ogivart.us/editor/Qpo7OAOnbe/
http://old.liceum9.ru/images/0/
http://ostadsarma.com/wp-admin/pYk64Hh3z5hjnMziZ/
Extracted
http://ordinateur.ogivart.us/editor/Qpo7OAOnbe/
Targets
-
-
Target
5c2972a5491e6d8209aa42964c99ad4f8621686005fbc5e1836b4b18d165a888
-
Size
113KB
-
MD5
7b10abef408978ea69c704e29e2e797a
-
SHA1
d5cec5db6eacae468496669bb602195e1d5b5cbd
-
SHA256
5c2972a5491e6d8209aa42964c99ad4f8621686005fbc5e1836b4b18d165a888
-
SHA512
ca797e6b8bb612dd4e94c36cf7f8f846014ec2b4884949c9b4d9e2901273930a0c5fc3a82ad0135226886e1e266f0afff4b051fe9a4fb8d018d4526e15c38a02
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Drops file in System32 directory
-