General
-
Target
7265e9cb793ecf5b81bfc2490246c6b5786b46ec8712658fc372dd766820bd79
-
Size
98KB
-
Sample
220520-1jbgtahbcj
-
MD5
20c938a6cb9b61bdfd59cc161ad740c8
-
SHA1
69033cd15754448fe777fe0b4f3be505e20b1f79
-
SHA256
7265e9cb793ecf5b81bfc2490246c6b5786b46ec8712658fc372dd766820bd79
-
SHA512
a113ed67ec8b46cce07e87e47016418cc1b64c68e6b41d96ca4d8c898fff6c47dbbab55d7af93d3da97f7caa376f11132806c9eaaaa157014a0ccff391225e4b
Static task
static1
Behavioral task
behavioral1
Sample
sample.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
sample.doc
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://manandvanwaterlooville.co.uk/wp-admin/prX892/
https://uniral.com/captchasignup/4J579681/
https://scyzm.net/lkx7/lqoH8S/
https://amagna.nl/DZ9MzAobu3/37Z/
https://nilinkeji.com/online/90fb31/
Targets
-
-
Target
sample
-
Size
169KB
-
MD5
68c5696712995f9965ceceb97984a41b
-
SHA1
1ceb894d78cb21e8619fd42f21c6e6960cb9ed86
-
SHA256
f1c56fe29cd7e0ea2967af2786c10bb6830fed226a6920d8905396bb8fd4e2d4
-
SHA512
cedfbfb7278e62b73c660657f3ee33c7ce1b0aa7acb0e8b138527c95cd75ef2d84d920f993c9a940ff48704b79576491cb0794418f5e09ce9f2be477bc7d32a1
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-