General
-
Target
4c32a8984c672cbf74049a8a8e08f3a85a777f10688f87cf9e6e5fec467e89f6
-
Size
98KB
-
Sample
220520-1qjrrsebg4
-
MD5
02cd9f088b3c69b99dd4416eaec29763
-
SHA1
c187a8e9bc77f80a6f8bc51278a7e71f346a9deb
-
SHA256
4c32a8984c672cbf74049a8a8e08f3a85a777f10688f87cf9e6e5fec467e89f6
-
SHA512
9ba582ca7461ece343b1b4e7088f9b75831b4a01337b7d6c33661185cac83d73ead937e647de376a5e3048caf81d8335f4493a02d01ae48e03653615c8e194a9
Static task
static1
Behavioral task
behavioral1
Sample
sample.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
sample.doc
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://manandvanwaterlooville.co.uk/wp-admin/prX892/
https://uniral.com/captchasignup/4J579681/
https://scyzm.net/lkx7/lqoH8S/
https://amagna.nl/DZ9MzAobu3/37Z/
https://nilinkeji.com/online/90fb31/
Targets
-
-
Target
sample
-
Size
169KB
-
MD5
293cebe3db8617cdf312d397697ac849
-
SHA1
b3cb21b4f0bedba71a08a2f252a4d5461626d40d
-
SHA256
a5b4fca70c16e40a7c4bad03de3c8f0448aea24ebbf989026202c94a9eeee7f8
-
SHA512
c3cc31e48915d60b36941eeb5e4d3126a5ddd886a7f81354fb0a85311f2687e99bc7f407c3f1ea94067f1d260d05b992cf8ad73351088cc6a58e13f4286e6cd0
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-