General
-
Target
20ae18835914f775fe36a135dcdc4554705cfab177ee8987c0a65f30706ff22e
-
Size
98KB
-
Sample
220520-1y2ybahfcl
-
MD5
a381ad19a163cdc159823991fa10b432
-
SHA1
2bd5bb4d61723eba125ea70b38e1d918cb6d9cc8
-
SHA256
20ae18835914f775fe36a135dcdc4554705cfab177ee8987c0a65f30706ff22e
-
SHA512
8ab89f3213234af05e5fc8df29713af884fdc41ee755e75d6ce671365889503d61d9626b92d2b6953032eba599cfb12a93b30c7f680169f7d70bff1bc75999db
Static task
static1
Behavioral task
behavioral1
Sample
sample.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
sample.doc
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://manandvanwaterlooville.co.uk/wp-admin/prX892/
https://uniral.com/captchasignup/4J579681/
https://scyzm.net/lkx7/lqoH8S/
https://amagna.nl/DZ9MzAobu3/37Z/
https://nilinkeji.com/online/90fb31/
Targets
-
-
Target
sample
-
Size
169KB
-
MD5
a609e6e8558854fcf0790ea63c140636
-
SHA1
32f420b41bffa36e7e4f36ff3b1897e20359b5e8
-
SHA256
0bb088266c59f91fde3293f80935b197971c500a8971a26037706aaf5e520a5d
-
SHA512
4f695d52ad1b64aa65ef11afc1add8f243b0d1eee0a4a2af3532d833f9542e0086e3d55bb0f041040661cfecc69112477bbe50b7e8692b2a9d82f1c584735de4
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-