General
-
Target
11b1395802f5598806562d9dc11542bf56b19e5278c521a556a7de8ca17723ee
-
Size
227KB
-
Sample
220604-baargsccf8
-
MD5
00ed3b913530f8a97e7280671f5d3a95
-
SHA1
502e2bf2a313c60ef2c5b0cddef2afe5abc9b546
-
SHA256
11b1395802f5598806562d9dc11542bf56b19e5278c521a556a7de8ca17723ee
-
SHA512
24a47ff6c13f9376719884158db4c605b227c8c0f4be02caeda5283ea4fe9ec32c2da9e5c3b0fc35a32ea8a1708ee69ab57a9fe2f6eb43ca76232da70004b18b
Static task
static1
Behavioral task
behavioral1
Sample
Tracking#6902522331741.vbs
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Tracking#6902522331741.vbs
Resource
win10v2004-20220414-en
Malware Config
Extracted
hancitor
1912_372823
http://howeelyzuq.com/4/forum.php
http://thriondery.ru/4/forum.php
http://craledlopj.ru/4/forum.php
Targets
-
-
Target
Tracking#6902522331741.vbs
-
Size
592KB
-
MD5
393258a792991fdab17305e275e5fd31
-
SHA1
231f60bdb55fc4597a2e4d53d4a43d66429207d2
-
SHA256
8bde2931a468cc81994985ec803bda715ea70ef2337defc252f404efc8650a51
-
SHA512
5d67586c90180f0637379bc7537b180a9083e5a125a9927a7320151a6a8e23a0dffefddccc5712679d1c25c3baddf6e5ac34fa41ff1230484d51c9a7424ae644
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-