General
-
Target
2899b6841f0906141c249b1557b39b7989ee98c7172bdbf5e366c8f2e8a8fb89
-
Size
127KB
-
Sample
220725-e8mqgsfbaj
-
MD5
5b6000ef0f25e0bc46f3f31204f4700b
-
SHA1
ac84b02f593cd905232b82b4629c7af6be31f577
-
SHA256
2899b6841f0906141c249b1557b39b7989ee98c7172bdbf5e366c8f2e8a8fb89
-
SHA512
266c49669b211649cfe122541488acc5ebfeac535cae101bb81e075530e5212112c08fb0632b5fae93926641cae9b575c58970d5d8a7e969312c9cf7320996a3
Static task
static1
Behavioral task
behavioral1
Sample
2899b6841f0906141c249b1557b39b7989ee98c7172bdbf5e366c8f2e8a8fb89.doc
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
2899b6841f0906141c249b1557b39b7989ee98c7172bdbf5e366c8f2e8a8fb89.doc
Resource
win10v2004-20220722-en
Malware Config
Extracted
http://securityone-eg.com/wp-content/c6zvhffmx_6skfqch2lf-4721/
http://randewoo.ir/profiles/50sq_qqdxeeln-04257/
https://www.aseanlegaltech.com/wp-includes/lFhhBfMMLK/
https://cybermagicindia.com/images/ur82i_90jm6p-55532/
http://3rdperson.ml/wp-includes/eEEGYADPv/
Targets
-
-
Target
2899b6841f0906141c249b1557b39b7989ee98c7172bdbf5e366c8f2e8a8fb89
-
Size
127KB
-
MD5
5b6000ef0f25e0bc46f3f31204f4700b
-
SHA1
ac84b02f593cd905232b82b4629c7af6be31f577
-
SHA256
2899b6841f0906141c249b1557b39b7989ee98c7172bdbf5e366c8f2e8a8fb89
-
SHA512
266c49669b211649cfe122541488acc5ebfeac535cae101bb81e075530e5212112c08fb0632b5fae93926641cae9b575c58970d5d8a7e969312c9cf7320996a3
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-