Resubmissions
10-08-2022 19:23
220810-x36waagae3 10General
-
Target
challenge-files.zip
-
Size
4.8MB
-
Sample
220810-x36waagae3
-
MD5
4edf33b3a4dd1c1c005aefeaa29c7f1d
-
SHA1
e4d4bb8c8dcf357b068019660fdc72e65f577857
-
SHA256
d312c079c51f2bf011902df86e1ca4cac84eb7c74ff104fa48a505caa88ef2fe
-
SHA512
b647d071e71ece4a4d5d4601f28cbcab9f12a85014f1d06cc80ed65f35c7d3f81fc0b27cfd0855b456194f50e7f5dd2ce9588077735c2ec7f43f4a1e38ee2803
Malware Config
Targets
-
-
Target
challenge-files.zip
-
Size
4.8MB
-
MD5
4edf33b3a4dd1c1c005aefeaa29c7f1d
-
SHA1
e4d4bb8c8dcf357b068019660fdc72e65f577857
-
SHA256
d312c079c51f2bf011902df86e1ca4cac84eb7c74ff104fa48a505caa88ef2fe
-
SHA512
b647d071e71ece4a4d5d4601f28cbcab9f12a85014f1d06cc80ed65f35c7d3f81fc0b27cfd0855b456194f50e7f5dd2ce9588077735c2ec7f43f4a1e38ee2803
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-