General
-
Target
d28b9b95666eb49011c60d4cf91b42ae39e3f9e388f4d87f3e63c55626d54bb4
-
Size
32KB
-
Sample
220521-ermn6acgcj
-
MD5
3759688eef1380d504950f2d182feb2a
-
SHA1
d04c71e2fbdd885b812b0abff05ab9381f84b35c
-
SHA256
d28b9b95666eb49011c60d4cf91b42ae39e3f9e388f4d87f3e63c55626d54bb4
-
SHA512
a3ee0cdb252ef8cfd0495964e846538eaba3e24f9b744858d47b07512b3f17e011b69e59b39b012a21b0da16e3113d71be66cf6fd6d0a9b2e9c2484e01f03690
Static task
static1
Behavioral task
behavioral1
Sample
d28b9b95666eb49011c60d4cf91b42ae39e3f9e388f4d87f3e63c55626d54bb4.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
d28b9b95666eb49011c60d4cf91b42ae39e3f9e388f4d87f3e63c55626d54bb4.doc
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
d28b9b95666eb49011c60d4cf91b42ae39e3f9e388f4d87f3e63c55626d54bb4
-
Size
32KB
-
MD5
3759688eef1380d504950f2d182feb2a
-
SHA1
d04c71e2fbdd885b812b0abff05ab9381f84b35c
-
SHA256
d28b9b95666eb49011c60d4cf91b42ae39e3f9e388f4d87f3e63c55626d54bb4
-
SHA512
a3ee0cdb252ef8cfd0495964e846538eaba3e24f9b744858d47b07512b3f17e011b69e59b39b012a21b0da16e3113d71be66cf6fd6d0a9b2e9c2484e01f03690
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-