General
-
Target
ovgroup_richiesta.doc
-
Size
173KB
-
Sample
220810-mcdrpshadj
-
MD5
b124e7dab51da1a7b7d69f14c07f3463
-
SHA1
2defdfa54404868bd0a19b026cd1ef7e067cc2df
-
SHA256
37c164c74aeee4be30e4ef4ff500251b6d35a87085b58b82b8f1de5364d5abd7
-
SHA512
5d4a15306f1945802be4fef214a6d0da498c6bdd7a795656215987a33904cb28c3476096846b5bec74e3580dd866d4a87069a2d5546bfd3dd7dc7c772383f616
Behavioral task
behavioral1
Sample
ovgroup_richiesta.doc
Resource
win10-20220414-en
Malware Config
Targets
-
-
Target
ovgroup_richiesta.doc
-
Size
173KB
-
MD5
b124e7dab51da1a7b7d69f14c07f3463
-
SHA1
2defdfa54404868bd0a19b026cd1ef7e067cc2df
-
SHA256
37c164c74aeee4be30e4ef4ff500251b6d35a87085b58b82b8f1de5364d5abd7
-
SHA512
5d4a15306f1945802be4fef214a6d0da498c6bdd7a795656215987a33904cb28c3476096846b5bec74e3580dd866d4a87069a2d5546bfd3dd7dc7c772383f616
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
An obfuscated cmd.exe command-line is typically used to evade detection.
-