General
-
Target
sample.doc
-
Size
68KB
-
Sample
230508-mjjljabh9t
-
MD5
b8ec7d16acf6131c28a1f339dab3fee0
-
SHA1
a6e15e55eeee5e652a11cfbce701e55c0cfddaae
-
SHA256
188b4e00fb268101935d345bb3a0b55e2141db18a8b438f90d37a7645b48dea3
-
SHA512
af71825f8c76e1633c8ad1a84fa9925e0ee30923bb848a03f8c9aa44424bb61b09da08bd37a4a23ff2e3abed5d338c8dd0b2a124e59e3436b35449a2001d1083
-
SSDEEP
1536:ADMemeY5C6OJsdBpZWo2at64mSR6kfxrtl:A4emeY5CTsdAzNSR6kJz
Behavioral task
behavioral1
Sample
sample.doc
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
sample.doc
Resource
win10v2004-20230220-en
Malware Config
Extracted
http://folckwanderers.com/wp-includes/t673/
http://norikkon.com/administrator/020/
http://compworldinc.com/browse/70676/
http://freelancedigitales.com/keo/ekb98m90542/
http://purviitech.com/111/dtl227/
Targets
-
-
Target
sample.doc
-
Size
68KB
-
MD5
b8ec7d16acf6131c28a1f339dab3fee0
-
SHA1
a6e15e55eeee5e652a11cfbce701e55c0cfddaae
-
SHA256
188b4e00fb268101935d345bb3a0b55e2141db18a8b438f90d37a7645b48dea3
-
SHA512
af71825f8c76e1633c8ad1a84fa9925e0ee30923bb848a03f8c9aa44424bb61b09da08bd37a4a23ff2e3abed5d338c8dd0b2a124e59e3436b35449a2001d1083
-
SSDEEP
1536:ADMemeY5C6OJsdBpZWo2at64mSR6kfxrtl:A4emeY5CTsdAzNSR6kJz
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-