General
-
Target
a8fb356f98ac70f8541c784bae6685ba0e0381f5dabfb030d32cec5e2499634c
-
Size
98KB
-
Sample
220520-z9wd8sgggj
-
MD5
aedb0e6d8b1e85d5ece8e9bbda69f79b
-
SHA1
41143b5e3b291c3fed41fe32be0021f2651c1f20
-
SHA256
a8fb356f98ac70f8541c784bae6685ba0e0381f5dabfb030d32cec5e2499634c
-
SHA512
7a31b177d3295daff821cf393d2d143602fec70477215d824d8cc2a39c70c96fbbce09f2bdce2376a18627ca51d3db4d51aabda5710702791d55c82604f7a85e
Static task
static1
Behavioral task
behavioral1
Sample
sample.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
sample.doc
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://manandvanwaterlooville.co.uk/wp-admin/prX892/
https://uniral.com/captchasignup/4J579681/
https://scyzm.net/lkx7/lqoH8S/
https://amagna.nl/DZ9MzAobu3/37Z/
https://nilinkeji.com/online/90fb31/
Targets
-
-
Target
sample
-
Size
169KB
-
MD5
484bfdfec5742ade491aef716e253c6a
-
SHA1
30a5778512aef149c40adb3e9292a7c8addac114
-
SHA256
59353bd2a96cfde81847bcf1480a531f68a1fcf0738161455a352c5b9babe28f
-
SHA512
68c82b5cb60622edf1dd420fe22ddfce92baf743b673bca19857381a334e18807589b7a1b400fd0c004b7bc96d78aafe2358f5573ae13e1e83bbf776e1e58058
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-