General
-
Target
SecuriteInfo.com.Exploit.Siggen3.17149.3543.14552
-
Size
38KB
-
Sample
220816-jldlhshab3
-
MD5
f758ac579e55bbc5fe8b729bfe99616c
-
SHA1
6b91b14af7b7fa8cc7a7b25256eee7f14b4eb325
-
SHA256
7b208abf05433369e1503ea96851a1b53eca58c6ef20dfaebf67c6813712cb89
-
SHA512
e457e74b209dcd5524f2e943c1eb3c016d60ed3c3fdfc331fdf488bd242113c581b3f8e7c8b627822203febea19b85dadafca855c643b93b261419697458530e
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Exploit.Siggen3.17149.3543.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Exploit.Siggen3.17149.3543.xls
Resource
win10v2004-20220812-en
Malware Config
Extracted
http://facextrade.com.br/wp-includes/certificates/4.txt
Targets
-
-
Target
SecuriteInfo.com.Exploit.Siggen3.17149.3543.14552
-
Size
38KB
-
MD5
f758ac579e55bbc5fe8b729bfe99616c
-
SHA1
6b91b14af7b7fa8cc7a7b25256eee7f14b4eb325
-
SHA256
7b208abf05433369e1503ea96851a1b53eca58c6ef20dfaebf67c6813712cb89
-
SHA512
e457e74b209dcd5524f2e943c1eb3c016d60ed3c3fdfc331fdf488bd242113c581b3f8e7c8b627822203febea19b85dadafca855c643b93b261419697458530e
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-