General
-
Target
P.O no. MGE-WJO 900622023.doc
-
Size
256KB
-
Sample
230510-xgb4sabe5t
-
MD5
3424cfffafbf86f25d6164cb52241760
-
SHA1
d1a18db163281b84c296e4d10c1ce175a0ab3769
-
SHA256
515763f1332d79dd6fee5b07406230ba63985a00f4c68002480c2ffc9eaa4e2f
-
SHA512
e71dced2ecede284e8351afaf8bf26868e7e324411fc4516386f0d8c111e59131efd82963f7a3f7cae5bcda8d983a76f396cdaee894ce560f31eef567f40008f
-
SSDEEP
3072:GLQg8/QZrZhrVOY2VaCMPyabGFhWLMaxYzLfm0qsq:GP8YNrVJ28CMPdGFhaMayfmln
Static task
static1
Behavioral task
behavioral1
Sample
P.O no. MGE-WJO 900622023.rtf
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
P.O no. MGE-WJO 900622023.rtf
Resource
win10v2004-20230220-en
Malware Config
Extracted
http://172.174.176.153/dll/new_rump_vb.net.txt
Targets
-
-
Target
P.O no. MGE-WJO 900622023.doc
-
Size
256KB
-
MD5
3424cfffafbf86f25d6164cb52241760
-
SHA1
d1a18db163281b84c296e4d10c1ce175a0ab3769
-
SHA256
515763f1332d79dd6fee5b07406230ba63985a00f4c68002480c2ffc9eaa4e2f
-
SHA512
e71dced2ecede284e8351afaf8bf26868e7e324411fc4516386f0d8c111e59131efd82963f7a3f7cae5bcda8d983a76f396cdaee894ce560f31eef567f40008f
-
SSDEEP
3072:GLQg8/QZrZhrVOY2VaCMPyabGFhWLMaxYzLfm0qsq:GP8YNrVJ28CMPdGFhaMayfmln
Score10/10-
Blocklisted process makes network request
-
Drops file in System32 directory
-