General
-
Target
NDA_B290.zip
-
Size
15KB
-
Sample
230510-web6bsbc6x
-
MD5
7d08dd4d65f5a02496e2ba98ff3bd2d8
-
SHA1
fdede5c4c5ca8d27efcd968854d8c9050a7febbe
-
SHA256
c0c3a8f60ee4855cdaa2767f605ac8a1b224498991b745ebd893763f6a69c1a0
-
SHA512
47053ea8c6c4be682e4d05bebf9e5b7b4de9d77286db91b64ba74c4c9b20bdf4fd158e15c699c5eead3ccd4b76c6dc42b4eb3fa952eb4f77197bdc479f0d31f0
-
SSDEEP
384:UlBAVrk03y3NGy6P35MZJvr1AKBl8iUcEnu0:UrAVYS5y6PixAECitEnu0
Static task
static1
Behavioral task
behavioral1
Sample
NDA_B290_May_10.wsf
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
NDA_B290_May_10.wsf
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
NDA_B290_May_10.wsf
-
Size
35KB
-
MD5
ddf006da73bb161b9108345a281553ce
-
SHA1
49cd72219c46a39adc4c2628e09861ef66b43577
-
SHA256
11d4a97656a6ef262273259e5efe67ffb99c471986d4b136da413a3d6584606a
-
SHA512
773e0e3e476bcb709a214aa1257653d451163feb8071a262c0725aa6686db002cd946f78fe35bc8d98b9acda97b76010f25104c9bde932d5116ed30a8dfa6a12
-
SSDEEP
768:gDMTaP0P5BhJAuUuF93svjuF9EP0pTkor04PBtlwaf1Y1ZOW2waDmj2kWog:gD2aMdCurGQeMFk3UDmZOHwimj/tg
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-