General
-
Target
SecuriteInfo.com.Exploit.Siggen3.17149.4489.28684
-
Size
38KB
-
Sample
220816-jldlhsebgn
-
MD5
a5589d03da5b07fa9b035921b38ba29f
-
SHA1
3468f6de4c2f018812c4393bffdc336ce8b73848
-
SHA256
1f60b1d80f74e60f61191fa9867de7b95cf5f0df6ae545aab006ddd983eb467d
-
SHA512
2e48471a36fa771c57e3d9779a1e61a56fddb629755d902bae4b52b976d093f5e8c5c04fd3fa22fe3785de33101a4374bb8fe00183e09a225654b67dab0e3efb
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Exploit.Siggen3.17149.4489.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Exploit.Siggen3.17149.4489.xls
Resource
win10v2004-20220812-en
Malware Config
Extracted
http://facextrade.com.br/wp-includes/certificates/4.txt
Targets
-
-
Target
SecuriteInfo.com.Exploit.Siggen3.17149.4489.28684
-
Size
38KB
-
MD5
a5589d03da5b07fa9b035921b38ba29f
-
SHA1
3468f6de4c2f018812c4393bffdc336ce8b73848
-
SHA256
1f60b1d80f74e60f61191fa9867de7b95cf5f0df6ae545aab006ddd983eb467d
-
SHA512
2e48471a36fa771c57e3d9779a1e61a56fddb629755d902bae4b52b976d093f5e8c5c04fd3fa22fe3785de33101a4374bb8fe00183e09a225654b67dab0e3efb
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-