General
-
Target
mjnxsxza
-
Size
175KB
-
Sample
220421-x95a2acfan
-
MD5
f8ab6670f00a035e68134a7fd4dcb264
-
SHA1
0fd60d0c821d6aa014171a05b7678a21b05056fe
-
SHA256
f794639d67379bfe9c95c945acab77981d8f44fc8d75e2566e09aaff420cb280
-
SHA512
f4f48f82ec065a0e7aaa2ae57eceeaead5b5ad7ff49b73cbaf332bf5329888714a8819aa64a95aabdec6471596f299d2a2c20e4557425e4da722d99cdbe5e45c
Static task
static1
Behavioral task
behavioral1
Sample
mjnxsxza.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
mjnxsxza.doc
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://www.greaudstudio.com/docs/olohz_suq_munasyr/
http://www.gravelrecords.com/wp-admin/5h_jns_l3s6/
http://gtsouth.com/drinkmenu/38vq_z8al_r5cujfy90n/
http://groncrete.com/bower_components/cvbh8_f0_84rai/
http://www.gunesoluk.com/eotps/heb_x_1ehlbx9/
Targets
-
-
Target
mjnxsxza
-
Size
175KB
-
MD5
f8ab6670f00a035e68134a7fd4dcb264
-
SHA1
0fd60d0c821d6aa014171a05b7678a21b05056fe
-
SHA256
f794639d67379bfe9c95c945acab77981d8f44fc8d75e2566e09aaff420cb280
-
SHA512
f4f48f82ec065a0e7aaa2ae57eceeaead5b5ad7ff49b73cbaf332bf5329888714a8819aa64a95aabdec6471596f299d2a2c20e4557425e4da722d99cdbe5e45c
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-