General
-
Target
e3467e09f74aed3c66b9966cee1c36b1ed161bc93782c48e98514ff3122f6564
-
Size
228KB
-
Sample
220520-3d6f4sggb2
-
MD5
f2af036df754bb60cffc435f360ec913
-
SHA1
23c42e1880d75f893da1050d8b96c749bf601c3e
-
SHA256
e3467e09f74aed3c66b9966cee1c36b1ed161bc93782c48e98514ff3122f6564
-
SHA512
b327d8b4bc181ba0c0d69c62bf5bab3eda6795d41785e55b0544f805487bdaf36b0796368e3ddc54d8e0917bb3ebe1f50d1838ede476b772f147ba8dbdefd372
Static task
static1
Behavioral task
behavioral1
Sample
e3467e09f74aed3c66b9966cee1c36b1ed161bc93782c48e98514ff3122f6564.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
e3467e09f74aed3c66b9966cee1c36b1ed161bc93782c48e98514ff3122f6564.doc
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://dautudatnenhoalac.com/wp-admin/DYAsI/
http://www.bewebpreneur.com/wp-admin/daHN/
http://www.allgreennmb.com/wp-content/themes/pridezz/t9iV/
http://www.baiduwanba.com/css/Ubh/
http://rileyaanestad.com/wp-includes/DXn1R/
Targets
-
-
Target
e3467e09f74aed3c66b9966cee1c36b1ed161bc93782c48e98514ff3122f6564
-
Size
228KB
-
MD5
f2af036df754bb60cffc435f360ec913
-
SHA1
23c42e1880d75f893da1050d8b96c749bf601c3e
-
SHA256
e3467e09f74aed3c66b9966cee1c36b1ed161bc93782c48e98514ff3122f6564
-
SHA512
b327d8b4bc181ba0c0d69c62bf5bab3eda6795d41785e55b0544f805487bdaf36b0796368e3ddc54d8e0917bb3ebe1f50d1838ede476b772f147ba8dbdefd372
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-