General
-
Target
1ff8a5ef8a5cbf054d243282e6e9765fb76f933e35c4301dc66ac8b2dc6f807b
-
Size
281KB
-
Sample
220731-kd2ttagcb2
-
MD5
1b50904ec0f85df5a04b71b4861fadf6
-
SHA1
cc60646c0b91941889e7c7e77634b7ad1b3ffe1b
-
SHA256
1ff8a5ef8a5cbf054d243282e6e9765fb76f933e35c4301dc66ac8b2dc6f807b
-
SHA512
a802926dab3dfbd5ff719963fd23f92ed5dadcbbd0fd24efb7a6b56772df7f2dda32968ac5d7cc78e3fd0fdf5e16f6cf4ded7db763b17dca1609824deb170ec4
Behavioral task
behavioral1
Sample
1ff8a5ef8a5cbf054d243282e6e9765fb76f933e35c4301dc66ac8b2dc6f807b.doc
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
1ff8a5ef8a5cbf054d243282e6e9765fb76f933e35c4301dc66ac8b2dc6f807b.doc
Resource
win10v2004-20220721-en
Malware Config
Extracted
https://thesilverant.com/test/dvr9/
http://firstmnd.com/wp/wp-content/3k960/
http://citylandgovap.net/8dqs5fv/6J/
http://deredia.com/cgi-bin/cbas/
http://fattoriaiponti.com/wp-admin/o1wiEqPfN/
Targets
-
-
Target
1ff8a5ef8a5cbf054d243282e6e9765fb76f933e35c4301dc66ac8b2dc6f807b
-
Size
281KB
-
MD5
1b50904ec0f85df5a04b71b4861fadf6
-
SHA1
cc60646c0b91941889e7c7e77634b7ad1b3ffe1b
-
SHA256
1ff8a5ef8a5cbf054d243282e6e9765fb76f933e35c4301dc66ac8b2dc6f807b
-
SHA512
a802926dab3dfbd5ff719963fd23f92ed5dadcbbd0fd24efb7a6b56772df7f2dda32968ac5d7cc78e3fd0fdf5e16f6cf4ded7db763b17dca1609824deb170ec4
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-