Behavioral task
behavioral1
Sample
PSMLP-44PR-192752003022.docx
Resource
win7-20220812-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
PSMLP-44PR-192752003022.docx
Resource
win10v2004-20220901-en
5 signatures
150 seconds
General
-
Target
43ea9830a36d83742a16261fdf05a7e2
-
Size
19KB
-
MD5
43ea9830a36d83742a16261fdf05a7e2
-
SHA1
756e3ddb7897419a5418b6b65e0e8d366792e078
-
SHA256
50679f9c1c1942c858eee7c2422a783ed3d12a53cc84327c0d3e5e1c6be46034
-
SHA512
ee62210f9ae6df7bda3d3e128438c4034a6f63340ab44df80622bd391ea1abc79f2be2b8bbcf82eb8376d3402293ba525718f47d2e4b0ddbdf13016e30d0df61
-
SSDEEP
384:D2UTBtEdm13tQEhFj5OOOO/p+gvMOj9BV:D2ULd5hFjlOO/p+gkM9v
Score
10/10
Malware Config
Extracted
Rule
Microsoft Office WebSettings Relationship
C2
http://document_doc@3323444136/uuUASDbjasduhuasduyuASHUDHUSADHUASDU/jhjjhjhjhhggftftftftftftf.doc
Signatures
-
resource yara_rule sample dropper_html
Files
-
43ea9830a36d83742a16261fdf05a7e2.eml
-
PSMLP-44PR-192752003022.docx.docx office2007
-
email-html-1.txt.html