General
-
Target
4eac733c3baf2c0bbbe15182edbab80fe81a0a8945d9654a0853043c44285be6
-
Size
98KB
-
Sample
220520-1pyjjahcgq
-
MD5
41ebdf739c9d0e7d4a20b01c81ec783b
-
SHA1
0a67b7d1592730c63b0d528e1fc2a23ac055ca0a
-
SHA256
4eac733c3baf2c0bbbe15182edbab80fe81a0a8945d9654a0853043c44285be6
-
SHA512
132fd911403641ca62b5ad3baa0d935df2fb8bcf14df1ef5fa75abb67aa6c84e6f775171596703d13cf3c8cf1d17cce511ff0664aa86568a26a614830cc95da0
Static task
static1
Behavioral task
behavioral1
Sample
sample.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
sample.doc
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://manandvanwaterlooville.co.uk/wp-admin/prX892/
https://uniral.com/captchasignup/4J579681/
https://scyzm.net/lkx7/lqoH8S/
https://amagna.nl/DZ9MzAobu3/37Z/
https://nilinkeji.com/online/90fb31/
Targets
-
-
Target
sample
-
Size
169KB
-
MD5
ba46a3bd260cabcd0d0076028d253438
-
SHA1
f747a6e3d9dc5dbd0ec8685757e741ecf37d5bd7
-
SHA256
68fa39fdeeb2482b9dbec2a1c2a7649e0a1e4b883528ef42b407a240bac4065e
-
SHA512
b74f3f049ca48448ca9c7a240c6124fe359ff7a6316ba22cefb720b2f4a827583f58b33e029e9abdeb674308192b0d5db33b58526e2e1979b2c4925db4df01bc
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-