General
-
Target
a2b6b27d1c8d1305a2c1b8d86fa5d369f96fe4984082dbbaecb4dec9b953da33
-
Size
98KB
-
Sample
220520-1az4tadfg8
-
MD5
29e910322bf0a4dd396433c630554d94
-
SHA1
61d1c5c3ca091b54ad825bcacfc13c8d2a9aff63
-
SHA256
a2b6b27d1c8d1305a2c1b8d86fa5d369f96fe4984082dbbaecb4dec9b953da33
-
SHA512
4d06ebb795461dc6807f1fdf35d1c92b9e894ca4f0fae42a9534527a9c195ed9fcefee1d9c0a5497677d8d883dda647165dd99b4980bf3256aea7ee044b77470
Static task
static1
Behavioral task
behavioral1
Sample
sample.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
sample.doc
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://manandvanwaterlooville.co.uk/wp-admin/prX892/
https://uniral.com/captchasignup/4J579681/
https://scyzm.net/lkx7/lqoH8S/
https://amagna.nl/DZ9MzAobu3/37Z/
https://nilinkeji.com/online/90fb31/
Targets
-
-
Target
sample
-
Size
168KB
-
MD5
cd4a2bd8e3d2e65d51756f5df553a447
-
SHA1
d19b580b11a75b8a282c56eb877550e01f25eebb
-
SHA256
a0106e59dd260be14700f439f7a350fc5c02d1c3f1eea2c3da779ea8edbdee42
-
SHA512
ebb451d6e123017a67ba5d03a54224b530f19467289d9c4ae0597bbef392cdb8b90ef94ade377cfc26823fe956dda8247993da9611bea477b545d09e621cd3a9
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-