General
-
Target
1f642685bd1f362d918f5568033fccf516e75af88646360b606f79c2b13f0c6a
-
Size
98KB
-
Sample
220520-1y6aqshfcn
-
MD5
175112cd042800c1839f2dfcd41a50d6
-
SHA1
3e9945b835a092ecc89e990e9ee70576fcb66c4a
-
SHA256
1f642685bd1f362d918f5568033fccf516e75af88646360b606f79c2b13f0c6a
-
SHA512
f4132f38205ec651d7773cb13899633ef23d9ba21474183ee563540f42c4b4e38c43cf55317a9065ba8ba7b76632cebcf8defe5d25f346b99f19cb9b3984b56d
Static task
static1
Behavioral task
behavioral1
Sample
sample.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
sample.doc
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://manandvanwaterlooville.co.uk/wp-admin/prX892/
https://uniral.com/captchasignup/4J579681/
https://scyzm.net/lkx7/lqoH8S/
https://amagna.nl/DZ9MzAobu3/37Z/
https://nilinkeji.com/online/90fb31/
Targets
-
-
Target
sample
-
Size
168KB
-
MD5
f241767e3a8ffa9df6a968c7bea97413
-
SHA1
46fe2b8b04c24fdd66eb0efc345e3f0b159ccbc5
-
SHA256
e984d53b336dd818e3eef16a2f8bf04eea19d132b7a1f1c82aff3cd7d1fcd01d
-
SHA512
3b79cf3ba84efd17c406a8c8ea6d774d5189737cde9dfc9abf615827052d2b9312f78a1717ea2de304f9425c344292fc11d20b4828e1da14fc5c085ebeb8cb4e
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-