General
-
Target
0e59cfb3146a35a9e641ac58b93565e1377274358baeaf05415872926d090007
-
Size
98KB
-
Sample
220520-12pgdseee2
-
MD5
a51b05f1da1560d555343a0a2980d10b
-
SHA1
9fe42460e41607899655150cd3fe46b27b66abf1
-
SHA256
0e59cfb3146a35a9e641ac58b93565e1377274358baeaf05415872926d090007
-
SHA512
be5a27c90e0877937e6d5482188db763a64a302a2cd3749dcf4bac606b8c46ac73911c4ec78664859d2b0f69546e981b0a3bf8e54d5e72a8cc3eb613279d947e
Static task
static1
Behavioral task
behavioral1
Sample
sample.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
sample.doc
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://manandvanwaterlooville.co.uk/wp-admin/prX892/
https://uniral.com/captchasignup/4J579681/
https://scyzm.net/lkx7/lqoH8S/
https://amagna.nl/DZ9MzAobu3/37Z/
https://nilinkeji.com/online/90fb31/
Targets
-
-
Target
sample
-
Size
169KB
-
MD5
0dbbff251aba81a1d865fc9159766c65
-
SHA1
5fb8a73a944403590bcdfff858c1247f0f543924
-
SHA256
ee5765cc9b118bc6b24079a4701e6ff2d9d91719f9fd11536b6448364b217cb2
-
SHA512
299f03412b42bb4c939398cea2e67f28f2bb7a8b3add49b2f1698639a8f02a6cfa6068457f172f09d8bfe1212e87a815594c16c2d5eac26a612ad8c18e43d09e
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-