General
-
Target
69cfdca448414b6ae4e0746f5edf803572ad0dce9d81bc4dc7df9cae2305715a
-
Size
98KB
-
Sample
220520-1klzyaeac4
-
MD5
4ddf3bcc77437efe7be8a56665fd6195
-
SHA1
69bbdad716b0b26d07523a81c095b04fdfda8bd0
-
SHA256
69cfdca448414b6ae4e0746f5edf803572ad0dce9d81bc4dc7df9cae2305715a
-
SHA512
33af4fde185240ba44f764cb681ab214f7fd48f0dd4814c85e82949e3fcac686f0ff04716fe5b1b8ef9698d74fe9290196a17e7cd62b52180b5e68a0d298500b
Static task
static1
Behavioral task
behavioral1
Sample
sample.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
sample.doc
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://manandvanwaterlooville.co.uk/wp-admin/prX892/
https://uniral.com/captchasignup/4J579681/
https://scyzm.net/lkx7/lqoH8S/
https://amagna.nl/DZ9MzAobu3/37Z/
https://nilinkeji.com/online/90fb31/
Targets
-
-
Target
sample
-
Size
169KB
-
MD5
cb581513103e5be1ce9a5dbe3201703f
-
SHA1
f24cb3961edc82974e76ea1fe33a2418add46443
-
SHA256
a671e2959966d9a945046df0dd4a878fbe99b378e108e50c8de5a2746ce7dde8
-
SHA512
aa12be691726339ad2dc1d68a42b3e6769be9cb1178a71844b4f4b7e9403ffddc87ae3429eda6945a76fe4b6cc4f86e7082668dfea038c70b8b850708f5529f4
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-