General
-
Target
fxtidglj
-
Size
195KB
-
Sample
220522-f4qr1sbban
-
MD5
2ff53c10a0d9f280aaa172284df6bed0
-
SHA1
3cd3a1a3c266acd3e139ad0e9afc623061b0c0dd
-
SHA256
33bab5da95407fde0ab439aa5942622a7e1286cb5ad74d4e55689fa5c59f8559
-
SHA512
17b0283e2bafb97dbaa5934cfc2620d56eb8f0c6acb0f24b709c904295d8783e84db55273281322a55889f79b14cd0a579d095f8037f29eeced2766609011dfd
Static task
static1
Behavioral task
behavioral1
Sample
fxtidglj.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
fxtidglj.doc
Resource
win10v2004-20220414-en
Malware Config
Extracted
https://vstbar.com/wp-admin/Hs/
http://binarywebtechsolutions.com/mobile-website-designing-company-in-gurgaon/CLZ/
http://shahqutubuddin.org/U/
http://cybersign-001-site5.gtempurl.com/2xwzq/bve/
https://star-speed.vip/wp-admin/Ttv/
https://treneg.com.br/rfvmbh/a/
https://cimsjr.com/hospital/x2f/
Targets
-
-
Target
fxtidglj
-
Size
195KB
-
MD5
2ff53c10a0d9f280aaa172284df6bed0
-
SHA1
3cd3a1a3c266acd3e139ad0e9afc623061b0c0dd
-
SHA256
33bab5da95407fde0ab439aa5942622a7e1286cb5ad74d4e55689fa5c59f8559
-
SHA512
17b0283e2bafb97dbaa5934cfc2620d56eb8f0c6acb0f24b709c904295d8783e84db55273281322a55889f79b14cd0a579d095f8037f29eeced2766609011dfd
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-