General
-
Target
9a183ea7ab2cff6214148463b0ca540be3a0a3ce0fd187ddbb88bbc42e674cc0
-
Size
98KB
-
Sample
220520-1bxp3sdga8
-
MD5
d6631e530281876eb4977460ec606974
-
SHA1
ebe3d36af21b65c115dfa88073656691d0b7ac94
-
SHA256
9a183ea7ab2cff6214148463b0ca540be3a0a3ce0fd187ddbb88bbc42e674cc0
-
SHA512
967cf80bf85e66f894b1efd89c2099d932b91a23baa829cd05c32204da1aa0de8fa538bf7b0678c8287eb34faa59c99421e3a71df7cf195f0b5898f0eea0e688
Static task
static1
Behavioral task
behavioral1
Sample
sample.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
sample.doc
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://manandvanwaterlooville.co.uk/wp-admin/prX892/
https://uniral.com/captchasignup/4J579681/
https://scyzm.net/lkx7/lqoH8S/
https://amagna.nl/DZ9MzAobu3/37Z/
https://nilinkeji.com/online/90fb31/
Targets
-
-
Target
sample
-
Size
168KB
-
MD5
8fa56e0d7beaaf857a171ba0f7b27b13
-
SHA1
94a535c4337bcc7f8e2badd49aa4bb829ac5f39e
-
SHA256
1ec0aea3e7613086f550e01f5014835b55ac12b7d35ad781c2173dd150a0eeba
-
SHA512
79a6cbcc57ab7a54b28f8ff86b2ccc35f1e70d6f56ceaeceb662bccecaabaa092d29056be26ac7f8f466a7600d126410f498635a6222d50724d05ce71d20f895
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-