General
-
Target
5be9cd898ca39fadca5eff334bc074e68522978bbbfb079a529a211b8b2fe6bd
-
Size
98KB
-
Sample
220520-1mjbtseag4
-
MD5
8fbbb4aaa3aedf4cd3be162f100e4dce
-
SHA1
d3da332109a20b22cf8a1d2db941fd6e96a6f469
-
SHA256
5be9cd898ca39fadca5eff334bc074e68522978bbbfb079a529a211b8b2fe6bd
-
SHA512
76a1e38b828e88bab1a3c35faff3e80e31f68acc5955bd69aafea8b265b8666bb91112067c31794a35d14def881493ece5a8f8b5a689ec1525700f9a98cc338a
Static task
static1
Behavioral task
behavioral1
Sample
sample.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
sample.doc
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://manandvanwaterlooville.co.uk/wp-admin/prX892/
https://uniral.com/captchasignup/4J579681/
https://scyzm.net/lkx7/lqoH8S/
https://amagna.nl/DZ9MzAobu3/37Z/
https://nilinkeji.com/online/90fb31/
Targets
-
-
Target
sample
-
Size
168KB
-
MD5
263d8c814d1382617e93f75ffc7295b8
-
SHA1
4a14fe6cceea05be724f7b9ef8db8a12d20777dd
-
SHA256
58088a9fda3119b215f1635d1dd1f036ee4788de1ae879597e78e7f3122b4b43
-
SHA512
700b9836fc954903943fdce42ece988d24fc0b125b38e801b002399720be15dff8b455202754976c32dc779c5251d4172d2c767296da7a457bbc5aed92b85669
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-