General
-
Target
a9764759ec720c17f2c01cc2460a85845a954e359da923c9530906cfad2d5557
-
Size
118KB
-
Sample
220521-egf4mahcg4
-
MD5
0739e4e9f3fb65529c39df41b4a8c878
-
SHA1
ecfaad173d03244894037e630aa5316ca82be45b
-
SHA256
a9764759ec720c17f2c01cc2460a85845a954e359da923c9530906cfad2d5557
-
SHA512
ff189774f622450abc423c71cc153ce83539166a87c52008fa4ec62b35ae719c08c4b38a10b0a3d619b4d57f470bcb76990c3bed2f88565e663d78e2a8a6e44c
Static task
static1
Behavioral task
behavioral1
Sample
sample.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
sample.doc
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://www.agentstepp.com/ww12/6ZI/
http://badaia.net/baiaseu/m4G4chJ/
http://www.bambagiotti.it/shop/ymwU6/
http://bbcalegal.com/attachments/AAyd/
http://mezes.de/title_htm_files/Mb/
http://computerfastfix.co.uk/css/DXj/
http://sacentrs.lv/wp-content/uploads/2018/Cc/
Targets
-
-
Target
sample
-
Size
250KB
-
MD5
55154bb0488d20fc010ce89b6aa9e431
-
SHA1
cba37a7e0a011b3ffc10e98cba7e31cd6d48e926
-
SHA256
e43cc464b6b4836872f6b9646769623cffe18363b47c7cb143c7d2386fb7939b
-
SHA512
a2d008273b8a06b89a0e69eb5273ac36064ed515d1638984fea409f14dfb6c909976e53308b29857e4ae2a29004dc3f0bd4a1b15876384b0b50862212e4cc7d7
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-