General
-
Target
8ffeab678d425795e55e0328ebf9685c5e2c2ec3d5094c0d88578a10d688c5a5
-
Size
79KB
-
Sample
221023-lnbaaahfgn
-
MD5
39de314ca12ec81359cbd1fabc12cb98
-
SHA1
d23e18a068f0ffde1fe7dbffbfa86ef459e3ee57
-
SHA256
8ffeab678d425795e55e0328ebf9685c5e2c2ec3d5094c0d88578a10d688c5a5
-
SHA512
67eb2a93e509ec34999f21757069d0729d06146796253e198d0449f2dfa83568a290cf7397a628a7489e2958fe61a45a387a1d3517397a79499f07ea0adfca73
-
SSDEEP
768:ixbpML2teJsNST+jBl8UDRxz99LHy85ZKYbkr+H/l7eYk3I:+M6ZNSTOl7DR31y8eYS+H/sj
Behavioral task
behavioral1
Sample
8ffeab678d425795e55e0328ebf9685c5e2c2ec3d5094c0d88578a10d688c5a5.doc
Resource
win7-20220812-en
Malware Config
Extracted
http://newyeargoka.top/read.php?f=0.dat
Targets
-
-
Target
8ffeab678d425795e55e0328ebf9685c5e2c2ec3d5094c0d88578a10d688c5a5
-
Size
79KB
-
MD5
39de314ca12ec81359cbd1fabc12cb98
-
SHA1
d23e18a068f0ffde1fe7dbffbfa86ef459e3ee57
-
SHA256
8ffeab678d425795e55e0328ebf9685c5e2c2ec3d5094c0d88578a10d688c5a5
-
SHA512
67eb2a93e509ec34999f21757069d0729d06146796253e198d0449f2dfa83568a290cf7397a628a7489e2958fe61a45a387a1d3517397a79499f07ea0adfca73
-
SSDEEP
768:ixbpML2teJsNST+jBl8UDRxz99LHy85ZKYbkr+H/l7eYk3I:+M6ZNSTOl7DR31y8eYS+H/sj
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-