General
-
Target
ff0ebab531232f9ae8d5b2ad78ace8848adffedec41de03b8676c956c14c6015
-
Size
184KB
-
Sample
220520-31nvkshha5
-
MD5
18153b00c4bcc38b4722b6d8a6ba7d8f
-
SHA1
12efef41170425598e89096a4069e0feee05bc96
-
SHA256
ff0ebab531232f9ae8d5b2ad78ace8848adffedec41de03b8676c956c14c6015
-
SHA512
32d4a1b7328a0d39dff9228dcaee00e617a040c767643458761107b682dc09fb3829b075ba0d13d4847babe9f556eaf2019acb9cfa31f5a38851abee1c0c124d
Static task
static1
Behavioral task
behavioral1
Sample
ff0ebab531232f9ae8d5b2ad78ace8848adffedec41de03b8676c956c14c6015.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ff0ebab531232f9ae8d5b2ad78ace8848adffedec41de03b8676c956c14c6015.doc
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://thestratumsphere.com/wp-admin/wODL/
https://tmlsconsulting.com/abay/RI/
https://is-yap.com/wp-admin/AA7/
http://chendonghui.cn/wp-content/Z/
http://veterinariapetlife.cl/4br/AXC5/
http://blueseasports.com/iv/
http://webdemo.cl/clmd/hVf/
Targets
-
-
Target
ff0ebab531232f9ae8d5b2ad78ace8848adffedec41de03b8676c956c14c6015
-
Size
184KB
-
MD5
18153b00c4bcc38b4722b6d8a6ba7d8f
-
SHA1
12efef41170425598e89096a4069e0feee05bc96
-
SHA256
ff0ebab531232f9ae8d5b2ad78ace8848adffedec41de03b8676c956c14c6015
-
SHA512
32d4a1b7328a0d39dff9228dcaee00e617a040c767643458761107b682dc09fb3829b075ba0d13d4847babe9f556eaf2019acb9cfa31f5a38851abee1c0c124d
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-