General
-
Target
e9101d348f50f967bb46bf2d2021dc4374ac30eeed17cecaf65382647fdc865c
-
Size
152KB
-
Sample
220201-dk6m1sfgbl
-
MD5
7966ac088ceb397fc6e7a713cc213b0d
-
SHA1
7e95fd3b246b3f889a70a409823407563427592f
-
SHA256
e9101d348f50f967bb46bf2d2021dc4374ac30eeed17cecaf65382647fdc865c
-
SHA512
0d38ffcee92abe0082e87cd30fec81b2a608b18571c8f28eda79afd770987b5e5d2ced42921e98839fc891c94546a744f88fd5b628fb28464fea13a531977e3c
Static task
static1
Behavioral task
behavioral1
Sample
e9101d348f50f967bb46bf2d2021dc4374ac30eeed17cecaf65382647fdc865c.doc
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
e9101d348f50f967bb46bf2d2021dc4374ac30eeed17cecaf65382647fdc865c.doc
Resource
win10v2004-en-20220113
Malware Config
Extracted
http://wsme.net/cgi-bin/xH/
http://justart.ma/wp-content/uploads/2019/01/Ti/
http://majorpart.co.th/wp/qI/
http://estudioalabi.com.ar/wp-admin/NvvP/
http://marketinsight.hu/wp-includes/ly/
Targets
-
-
Target
e9101d348f50f967bb46bf2d2021dc4374ac30eeed17cecaf65382647fdc865c
-
Size
152KB
-
MD5
7966ac088ceb397fc6e7a713cc213b0d
-
SHA1
7e95fd3b246b3f889a70a409823407563427592f
-
SHA256
e9101d348f50f967bb46bf2d2021dc4374ac30eeed17cecaf65382647fdc865c
-
SHA512
0d38ffcee92abe0082e87cd30fec81b2a608b18571c8f28eda79afd770987b5e5d2ced42921e98839fc891c94546a744f88fd5b628fb28464fea13a531977e3c
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-