General
-
Target
728d0def3186dc60e0b0ae365fe750930be37151b1a1e8165a25288026dd2b16
-
Size
146KB
-
Sample
220625-k5k1dagec3
-
MD5
13a08d07bf9168fd0cda074234f02330
-
SHA1
cafb64ca399c6df7581aa40d0b47a528f7a05b11
-
SHA256
728d0def3186dc60e0b0ae365fe750930be37151b1a1e8165a25288026dd2b16
-
SHA512
4eeedfa1929883375b339e230988cecfa41a86cd75b0c821aaf860c07a0dc58afbbe86b01d6d8f808515f0d4b660f54728f0493a126628ae011a0ee97afda6f3
Static task
static1
Behavioral task
behavioral1
Sample
728d0def3186dc60e0b0ae365fe750930be37151b1a1e8165a25288026dd2b16.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
728d0def3186dc60e0b0ae365fe750930be37151b1a1e8165a25288026dd2b16.doc
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://mireiatorrent.com/wp-includes/bj07f0biw9_0sj91efi-0/
http://msograteful.com/codImwUJbt/
http://escoder.net/cgi-bin/OmrZcAEqS/
http://priyainfosys.com/products/FSrnZTOgOA/
http://llona.net/bqi776dm_agvux-6816533798/
Targets
-
-
Target
728d0def3186dc60e0b0ae365fe750930be37151b1a1e8165a25288026dd2b16
-
Size
146KB
-
MD5
13a08d07bf9168fd0cda074234f02330
-
SHA1
cafb64ca399c6df7581aa40d0b47a528f7a05b11
-
SHA256
728d0def3186dc60e0b0ae365fe750930be37151b1a1e8165a25288026dd2b16
-
SHA512
4eeedfa1929883375b339e230988cecfa41a86cd75b0c821aaf860c07a0dc58afbbe86b01d6d8f808515f0d4b660f54728f0493a126628ae011a0ee97afda6f3
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-