General
-
Target
2c6d2d2ed356a2938dec308a738fe8abd789c77bea1d54b2cc38f37e3435ae53
-
Size
98KB
-
Sample
220520-1wt5paeda9
-
MD5
55511270d5d1bda2b4b3181770a9aef8
-
SHA1
d07a3fb11029a9de060fc28fd341242171967ab3
-
SHA256
2c6d2d2ed356a2938dec308a738fe8abd789c77bea1d54b2cc38f37e3435ae53
-
SHA512
f15facb2d32ea53820f8e6c4861b4980d9839bb36f0a060d446b808add8a761f90e4fa83df083329fb26910bbd1a48687eaa259071b4c9bf8b0f1e69ce1bbf8b
Static task
static1
Behavioral task
behavioral1
Sample
sample.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
sample.doc
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://manandvanwaterlooville.co.uk/wp-admin/prX892/
https://uniral.com/captchasignup/4J579681/
https://scyzm.net/lkx7/lqoH8S/
https://amagna.nl/DZ9MzAobu3/37Z/
https://nilinkeji.com/online/90fb31/
Targets
-
-
Target
sample
-
Size
168KB
-
MD5
a9f533936e483d29537770a7f46eee6f
-
SHA1
f7a6b82c933ad5662a1f777e5bb802b6cedc0467
-
SHA256
e268b10eb0bfb444dda5b889024b51736afed21d56dedd0bbda1446cea02ae1e
-
SHA512
d08b17f1427f0680eb53ea7fbc604d32fc9ecbf7d4403bb5b462e8fccbab70c336ca411ca6775a123d01c8269f73119c3d2d0dddc69b3b5a61a2aa3870864f65
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-