General
-
Target
b7d1bcec14532ab0556f398e2cc65e030dbbbd4fb11fbe75331d8f789db46a3f
-
Size
118KB
-
Sample
220521-efzjkscdaj
-
MD5
5367bd79630a16faf6a76be2ff8c7f5d
-
SHA1
6fc7709487361e253e77d828091d9086c2ed1ebd
-
SHA256
b7d1bcec14532ab0556f398e2cc65e030dbbbd4fb11fbe75331d8f789db46a3f
-
SHA512
fef7f5c109c1448c0bf66c074b314ff0f368ee3ec2f13c657251e9551b411f441dc436e56dc276d02ab206d485a86a90254ac0811e7ce818a09e740e5aa22975
Static task
static1
Behavioral task
behavioral1
Sample
sample.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
sample.doc
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://www.agentstepp.com/ww12/6ZI/
http://badaia.net/baiaseu/m4G4chJ/
http://www.bambagiotti.it/shop/ymwU6/
http://bbcalegal.com/attachments/AAyd/
http://mezes.de/title_htm_files/Mb/
http://computerfastfix.co.uk/css/DXj/
http://sacentrs.lv/wp-content/uploads/2018/Cc/
Targets
-
-
Target
sample
-
Size
249KB
-
MD5
850d33570779d1f3b1d4715dda7dbd69
-
SHA1
cae32953f99a79bd3793de0a3592701039952c77
-
SHA256
8dc53146fa1fa554598b41a8473bb728a08c62da3ad00731d4d4e83a3435232b
-
SHA512
78d9e66be187139c6a7c0df4d699ffd038db2373e498aea50f0926e4cac374526aadfe5d4b91fca6b72d1482db81ee610d490915d409ca709000a33affdbbe9e
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-