General
-
Target
9532743ba2305e568e69d5086a05da30436b30be733548c4d28222bfa9f456fa
-
Size
322KB
-
Sample
220131-vhe6qaafd7
-
MD5
4ca02d884e80c7333257d762e6964805
-
SHA1
85c47af2826ab8979b09df68a1ff5a7cb35fed42
-
SHA256
9532743ba2305e568e69d5086a05da30436b30be733548c4d28222bfa9f456fa
-
SHA512
e40819c9090c793644bfb52bba15ba346a20bbd2027dcd1e02935433777f8a3c8dc15dce278514ca024b35f559399b82d0419a390c674bcf7d93a463f1907980
Static task
static1
Behavioral task
behavioral1
Sample
9532743ba2305e568e69d5086a05da30436b30be733548c4d28222bfa9f456fa.doc
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
9532743ba2305e568e69d5086a05da30436b30be733548c4d28222bfa9f456fa.doc
Resource
win10v2004-en-20220112
Malware Config
Extracted
hancitor
1609_dkytr
http://plivatecez.com/8/forum.php
http://agarreaters.ru/8/forum.php
http://weratiands.ru/8/forum.php
Targets
-
-
Target
9532743ba2305e568e69d5086a05da30436b30be733548c4d28222bfa9f456fa
-
Size
322KB
-
MD5
4ca02d884e80c7333257d762e6964805
-
SHA1
85c47af2826ab8979b09df68a1ff5a7cb35fed42
-
SHA256
9532743ba2305e568e69d5086a05da30436b30be733548c4d28222bfa9f456fa
-
SHA512
e40819c9090c793644bfb52bba15ba346a20bbd2027dcd1e02935433777f8a3c8dc15dce278514ca024b35f559399b82d0419a390c674bcf7d93a463f1907980
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Sets service image path in registry
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-