General
-
Target
8a35c1865bac08d865b42f376b27091b3abce6a9c261daacce084dcf6f7b73e3
-
Size
233KB
-
Sample
220701-hrzkhaghbm
-
MD5
20dc70286bf91c3b45dd754e94508676
-
SHA1
3aeca0f5f335718adf5d62b61098cf57974f2dd1
-
SHA256
8a35c1865bac08d865b42f376b27091b3abce6a9c261daacce084dcf6f7b73e3
-
SHA512
868ed81d5153024d990c19a7918785e6dba151b12fee104f4d00d3c27a345cb08f50c8c7602ef01e076918d4f9ae9fa57cb221353c013d31babf4928c0074e35
Static task
static1
Behavioral task
behavioral1
Sample
8a35c1865bac08d865b42f376b27091b3abce6a9c261daacce084dcf6f7b73e3.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
8a35c1865bac08d865b42f376b27091b3abce6a9c261daacce084dcf6f7b73e3.doc
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://bayboratek.com/28032019yedek/fd_2/
http://client.ideatech.pk/wp-content/3_d/
http://fabric-ville.net/2017/y_J/
http://hadiyaacoub.com/wp-content/uploads/2019/Mj_W/
http://himatika.mipa.uns.ac.id/wp-content/By_2/
Targets
-
-
Target
8a35c1865bac08d865b42f376b27091b3abce6a9c261daacce084dcf6f7b73e3
-
Size
233KB
-
MD5
20dc70286bf91c3b45dd754e94508676
-
SHA1
3aeca0f5f335718adf5d62b61098cf57974f2dd1
-
SHA256
8a35c1865bac08d865b42f376b27091b3abce6a9c261daacce084dcf6f7b73e3
-
SHA512
868ed81d5153024d990c19a7918785e6dba151b12fee104f4d00d3c27a345cb08f50c8c7602ef01e076918d4f9ae9fa57cb221353c013d31babf4928c0074e35
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-