General
-
Target
0296a26e1245a0fb567e01ac60f0de8b6bb2b7baefa06f246b47b4bca78058c9
-
Size
98KB
-
Sample
220520-14hrmaefa6
-
MD5
eb54450847e05f350568ea256b6e936d
-
SHA1
38f5def87a4ed752e33acc9304ae0781d133382f
-
SHA256
0296a26e1245a0fb567e01ac60f0de8b6bb2b7baefa06f246b47b4bca78058c9
-
SHA512
38ed4aa6d0428cc1717adb2728a1fca305bf7be106f52c145b2e02ae6d36d3afc75cbcd26d8f9bd8e87a1fc57a0e05a90f4eb213c96f9323592ebd74d76b1322
Static task
static1
Behavioral task
behavioral1
Sample
sample.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
sample.doc
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://manandvanwaterlooville.co.uk/wp-admin/prX892/
https://uniral.com/captchasignup/4J579681/
https://scyzm.net/lkx7/lqoH8S/
https://amagna.nl/DZ9MzAobu3/37Z/
https://nilinkeji.com/online/90fb31/
Targets
-
-
Target
sample
-
Size
169KB
-
MD5
408c1106ba8fdc3b76918eae19deaa5c
-
SHA1
3a4fcfba0d27cc5e6d57881bdb246cae7313cb65
-
SHA256
2ef95fd9c222a0b299b53659e79526a1281e9d076b75aafaedb447034237ba36
-
SHA512
5dbf0e4321ba384d004d33c107043274c73dbbfd70e26cd41ca99ea40b5393c529a5233cba5505040c5146339cb47f1ef366608c7a3a2de0fb91af557f1ea485
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-