General
-
Target
b4fdb77c5b6eede55fa1025dcbd522ada24dc6fef82efbeac60934cb6a8e8005
-
Size
109KB
-
Sample
220201-ez4mmsgehq
-
MD5
be1f448868949ba25e0b199e1e3139b2
-
SHA1
87435983272d0ff58ffaf105452e3e6322694ed7
-
SHA256
b4fdb77c5b6eede55fa1025dcbd522ada24dc6fef82efbeac60934cb6a8e8005
-
SHA512
2834635393ff61b60a06573df17582740e8f41f6c2eb5bdda685c5d5dd494691f4a34748e9693fff3b5834c133eb969f0ba207b8b13677652f8c1dca9bf81a2d
Static task
static1
Behavioral task
behavioral1
Sample
b4fdb77c5b6eede55fa1025dcbd522ada24dc6fef82efbeac60934cb6a8e8005.doc
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
b4fdb77c5b6eede55fa1025dcbd522ada24dc6fef82efbeac60934cb6a8e8005.doc
Resource
win10v2004-en-20220113
Malware Config
Extracted
http://rechholz.de/yYw1qvd/
http://psd-ga.com/zapgovno/Nhfxs/
http://gtdesign.ch/oFNj7EV/
http://startstudio.it/nDFE7y/
Targets
-
-
Target
b4fdb77c5b6eede55fa1025dcbd522ada24dc6fef82efbeac60934cb6a8e8005
-
Size
109KB
-
MD5
be1f448868949ba25e0b199e1e3139b2
-
SHA1
87435983272d0ff58ffaf105452e3e6322694ed7
-
SHA256
b4fdb77c5b6eede55fa1025dcbd522ada24dc6fef82efbeac60934cb6a8e8005
-
SHA512
2834635393ff61b60a06573df17582740e8f41f6c2eb5bdda685c5d5dd494691f4a34748e9693fff3b5834c133eb969f0ba207b8b13677652f8c1dca9bf81a2d
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Sets service image path in registry
-