General
-
Target
a0331e7c78cf8094e5b58707259a8cf46ed4922040109f73dc42dabee9ea4373
-
Size
98KB
-
Sample
220520-1a9m9aghbq
-
MD5
fd17ff90ef44c58e56a97bef34305db8
-
SHA1
9e776f032aa402cdf5e19483377801c2e02ede14
-
SHA256
a0331e7c78cf8094e5b58707259a8cf46ed4922040109f73dc42dabee9ea4373
-
SHA512
ea0097911bd9a2c2289a1456c9ddeeb3c7ef32675c243d898f41a727b2e01f103e102667414b7c08e15dfb1fecebf97beb02360371bf923cdebb27639a2021e6
Static task
static1
Behavioral task
behavioral1
Sample
sample.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
sample.doc
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://manandvanwaterlooville.co.uk/wp-admin/prX892/
https://uniral.com/captchasignup/4J579681/
https://scyzm.net/lkx7/lqoH8S/
https://amagna.nl/DZ9MzAobu3/37Z/
https://nilinkeji.com/online/90fb31/
Targets
-
-
Target
sample
-
Size
169KB
-
MD5
3e988040135078b734779e054e478187
-
SHA1
3ca65d6350a03b502cc2b2dfcce30b623e9543e8
-
SHA256
30fcc5f2374d48761f6da68dacfcc248ba3f1326be782d14dba7770908ca7957
-
SHA512
0daa46a769b70569ad3cbe2c3c2636840853d03535200d242bf5d4778a7d432a6ce0f8fdede73dd96e95a5a074cd7beea559d31b491fcfb2b8d8694a188714dd
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-