General
-
Target
7c7be6cd37f2590fd81701d4c2e98e5c972c166e6378993d443373f920001f0a
-
Size
98KB
-
Sample
220520-1gt65shahm
-
MD5
1f68bb3d5590282b1ceafd6714fe4825
-
SHA1
805a51ea487dfa69298df87f46fd461a9b585c5e
-
SHA256
7c7be6cd37f2590fd81701d4c2e98e5c972c166e6378993d443373f920001f0a
-
SHA512
b5a0f091a83d921fd33c28095ceb325a2322de350c69e7f078069a1c51e1af7f06281b7a19da389be727b7f038726c1ddbfaa8b710442ae90efe8e21dbdbb9ac
Static task
static1
Behavioral task
behavioral1
Sample
sample.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
sample.doc
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://manandvanwaterlooville.co.uk/wp-admin/prX892/
https://uniral.com/captchasignup/4J579681/
https://scyzm.net/lkx7/lqoH8S/
https://amagna.nl/DZ9MzAobu3/37Z/
https://nilinkeji.com/online/90fb31/
Targets
-
-
Target
sample
-
Size
169KB
-
MD5
885b754258cab242b8a1bf6cc602e77d
-
SHA1
3fda24e3241fadb9934f064af5eb120f39a75c2a
-
SHA256
ce5d6aa5b1cfe76e48ec485669e784f6e6fa115c5c008cd89c499726b2a74652
-
SHA512
b60c447cf88cc8022b18024dba768b839a6f0dffc2872cb497e92d3825945f6bfe7f5995beb9bccf04350e996b4613f575f8794f7db328095125e58c86504dad
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-