General
-
Target
0faa2c2d34917cf03fec0fc62476fd875ece30a6c4fd34492adf5ec5c5122c49
-
Size
98KB
-
Sample
220520-12hzlshfhp
-
MD5
6f70e118d2f76719f959d2f38ecf6aa5
-
SHA1
6a67c02a7a05ac6ff946f5a84b9dc6a1bf451ab9
-
SHA256
0faa2c2d34917cf03fec0fc62476fd875ece30a6c4fd34492adf5ec5c5122c49
-
SHA512
9342fc9ec324ea28712e86403b261050bdb203765f728addae2f5b5180bf3c6baca7a1e9278b4066b236f313badf10f6a3ba677b85c810484421f2d478e31c1b
Static task
static1
Behavioral task
behavioral1
Sample
sample.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
sample.doc
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://manandvanwaterlooville.co.uk/wp-admin/prX892/
https://uniral.com/captchasignup/4J579681/
https://scyzm.net/lkx7/lqoH8S/
https://amagna.nl/DZ9MzAobu3/37Z/
https://nilinkeji.com/online/90fb31/
Targets
-
-
Target
sample
-
Size
169KB
-
MD5
8a4a57846eea8faa5c726d61b5859c19
-
SHA1
735149f6becbf5b4ffeb91ebdd7699151bffb3cf
-
SHA256
7749011322a1fa88e88ac29e4663fc961f0b6ca6432e1257aefaceb28252a4c3
-
SHA512
f3c33220e6b1582a9b9d67b4b45614b659165c06498a12d7427e666368e77b5fc02cadfd42abf535b8b550ef91d2768746f97a29891799492185ae673be0a07f
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-