General
-
Target
1b2215a804fff054e6936894958c7432956e363bb98e377eea63ec91030daff1
-
Size
281KB
-
Sample
220913-3vslkscfen
-
MD5
7e71829ba50b8a21a57ddfeaa49745f8
-
SHA1
372f33e4068ba6cccea8416d65c6b4f01710ee56
-
SHA256
1b2215a804fff054e6936894958c7432956e363bb98e377eea63ec91030daff1
-
SHA512
35c8507f8061530769ec3e315887f50eadb951f4f28ba2ec899bec41fbafa4eef315e20bc65154c2daa18bb3aedcc8c472315db85fa5312cf9ac7c61cfa97493
-
SSDEEP
6144:wPVyTbVLydSNjUKjt77qShcr+jdT5uWMC4T5uWMCBT5uWMCGT5uWMC/T5uWMC0Tn:HXVOSjUKsShcr+xT514T51BT51GT51/u
Static task
static1
Behavioral task
behavioral1
Sample
1b2215a804fff054e6936894958c7432956e363bb98e377eea63ec91030daff1.docx
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1b2215a804fff054e6936894958c7432956e363bb98e377eea63ec91030daff1.docx
Resource
win10v2004-20220812-en
Malware Config
Extracted
https://www.mediafire.com/file/8cc0e6ohfqnk7yp/3.htm/file
Targets
-
-
Target
1b2215a804fff054e6936894958c7432956e363bb98e377eea63ec91030daff1
-
Size
281KB
-
MD5
7e71829ba50b8a21a57ddfeaa49745f8
-
SHA1
372f33e4068ba6cccea8416d65c6b4f01710ee56
-
SHA256
1b2215a804fff054e6936894958c7432956e363bb98e377eea63ec91030daff1
-
SHA512
35c8507f8061530769ec3e315887f50eadb951f4f28ba2ec899bec41fbafa4eef315e20bc65154c2daa18bb3aedcc8c472315db85fa5312cf9ac7c61cfa97493
-
SSDEEP
6144:wPVyTbVLydSNjUKjt77qShcr+jdT5uWMC4T5uWMCBT5uWMCGT5uWMC/T5uWMC0Tn:HXVOSjUKsShcr+xT514T51BT51GT51/u
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-