General
-
Target
132b80a7e447dfd6893270baa35d4a97fdccf1bf7306fe94f81233d1ea15bc9b
-
Size
148KB
-
Sample
220731-j77rgsghgj
-
MD5
ac311f203eee100fdf576e5b5510b761
-
SHA1
560fd00010580f37b799d559fa7b8b5874101134
-
SHA256
132b80a7e447dfd6893270baa35d4a97fdccf1bf7306fe94f81233d1ea15bc9b
-
SHA512
507ecdc21e524ef02b72bfadd42c6a5d452fa7a0b124812a6057184b0f0a6d8c4a28861e926582dc34842de56c0d04f2fe628dfad04aa865369a4537d3526fa5
Static task
static1
Behavioral task
behavioral1
Sample
132b80a7e447dfd6893270baa35d4a97fdccf1bf7306fe94f81233d1ea15bc9b.doc
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
132b80a7e447dfd6893270baa35d4a97fdccf1bf7306fe94f81233d1ea15bc9b.doc
Resource
win10v2004-20220721-en
Malware Config
Extracted
https://www.wholesale-towels.com/caapa/2skq2c8brl_ujstqor-9423/
https://sehatmadu.com/wp-admin/sMsnqVEHO/
http://wayuansudamai.com/wp-includes/tUhChhCpcN/
http://vnilla.com/cgi-bin/xdmlv_90ij5qu1-86492/
http://vcontenidos.com/wp-admin/nzxnfyy9_x7u5tyux4w-71288/
Targets
-
-
Target
132b80a7e447dfd6893270baa35d4a97fdccf1bf7306fe94f81233d1ea15bc9b
-
Size
148KB
-
MD5
ac311f203eee100fdf576e5b5510b761
-
SHA1
560fd00010580f37b799d559fa7b8b5874101134
-
SHA256
132b80a7e447dfd6893270baa35d4a97fdccf1bf7306fe94f81233d1ea15bc9b
-
SHA512
507ecdc21e524ef02b72bfadd42c6a5d452fa7a0b124812a6057184b0f0a6d8c4a28861e926582dc34842de56c0d04f2fe628dfad04aa865369a4537d3526fa5
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-