General
-
Target
9b28f78ebb97bc88b473fb92cafd03ef
-
Size
1.3MB
-
Sample
221108-nrs1lseca4
-
MD5
9b28f78ebb97bc88b473fb92cafd03ef
-
SHA1
345524df277ae83f974dbb121b01b571b7d7f528
-
SHA256
da8996a9e24fb4286a984cb02a21b613232ba9afcaaa0949d18d4ca11d08ccf1
-
SHA512
03dbff5c4d8b1038de19beb2878b2d76c344a75a4eb844914770b866974566fc9addc1e30bd18939b8663f51c924108353524eacb0772db29cb9e944de723788
-
SSDEEP
24576:mEIZ4wA74D4SQKxZcy8gthDW4/chYusVNVQK0U/S8mB:m+wJD4QZh/qWKMn70uS8K
Behavioral task
behavioral1
Sample
9b28f78ebb97bc88b473fb92cafd03ef.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9b28f78ebb97bc88b473fb92cafd03ef.doc
Resource
win10v2004-20220812-en
Malware Config
Extracted
hancitor
2306_vensip
http://extilivelly.com/8/forum.php
http://cludimetifte.ru/8/forum.php
http://sakincesed.ru/8/forum.php
Targets
-
-
Target
9b28f78ebb97bc88b473fb92cafd03ef
-
Size
1.3MB
-
MD5
9b28f78ebb97bc88b473fb92cafd03ef
-
SHA1
345524df277ae83f974dbb121b01b571b7d7f528
-
SHA256
da8996a9e24fb4286a984cb02a21b613232ba9afcaaa0949d18d4ca11d08ccf1
-
SHA512
03dbff5c4d8b1038de19beb2878b2d76c344a75a4eb844914770b866974566fc9addc1e30bd18939b8663f51c924108353524eacb0772db29cb9e944de723788
-
SSDEEP
24576:mEIZ4wA74D4SQKxZcy8gthDW4/chYusVNVQK0U/S8mB:m+wJD4QZh/qWKMn70uS8K
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-