General
-
Target
56d6488a1b865cef4425d95aced79a4ad03364810e505fb1964d20be3a40de53
-
Size
168KB
-
Sample
220701-fmdfcsdadl
-
MD5
f25839380349099bcc91c17e337410c9
-
SHA1
e0d97e0496f43485f8ab9538e79d90d3845fa309
-
SHA256
56d6488a1b865cef4425d95aced79a4ad03364810e505fb1964d20be3a40de53
-
SHA512
0eaea2f974781b1501b20dec6f37c5c445acb4b3035b26cf0795aa45bbbd9ab0175a6dc051b74564d4db46fdb746f05e64ad7a575fdaa87bda59567e3933edec
Static task
static1
Behavioral task
behavioral1
Sample
56d6488a1b865cef4425d95aced79a4ad03364810e505fb1964d20be3a40de53.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
56d6488a1b865cef4425d95aced79a4ad03364810e505fb1964d20be3a40de53.doc
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://artmikhalchyk.com/wp-includes/mYW3/
http://franosbarbershop.com/wp-content/plugins/IUh1/
http://arexcargo.com/wp-includes/QBci/
http://altarfx.com/wordpress/wQYt/
http://uitcs.acm.org/wp-content/fqSlt/
Targets
-
-
Target
56d6488a1b865cef4425d95aced79a4ad03364810e505fb1964d20be3a40de53
-
Size
168KB
-
MD5
f25839380349099bcc91c17e337410c9
-
SHA1
e0d97e0496f43485f8ab9538e79d90d3845fa309
-
SHA256
56d6488a1b865cef4425d95aced79a4ad03364810e505fb1964d20be3a40de53
-
SHA512
0eaea2f974781b1501b20dec6f37c5c445acb4b3035b26cf0795aa45bbbd9ab0175a6dc051b74564d4db46fdb746f05e64ad7a575fdaa87bda59567e3933edec
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-