General
-
Target
MDE_File_Sample_84ecb958fc4bef4cbc9f4934d7069397c5b96dca.zip
-
Size
260KB
-
Sample
230511-kgcdbsed7z
-
MD5
da47fd0d80c0b041160edfb2857f9cdc
-
SHA1
a94315e48ebc84d699f234790a145f87bae86b8e
-
SHA256
796e7fd046d193c74fb478bcd2473379b96b4dc37f85a1e9a1c6024fc0c963ef
-
SHA512
646389b0b811c673d7c8e009b63c432a51be0897846b4017d7f0d4ec43b4e43b7e77b1a88debca9009f6546f04ecd216e28976cfb764d09e755761b799ae48e8
-
SSDEEP
6144:GWPPl1/g+pgRHv9ZMji215RZ5zhlHHgKd5LlfgtL:jPPlJg+pVi215RDnQR
Static task
static1
Behavioral task
behavioral1
Sample
Мобилизационное предписание №186-31005-23 от 10.05.2023.exe
Resource
win10-20230220-en
Malware Config
Targets
-
-
Target
Мобилизационное предписание №186-31005-23 от 10.05.2023.exe
-
Size
437KB
-
MD5
7143e68ee9d464446312eef1ace05482
-
SHA1
f397d009ea6cde40dd7e3a501dd37c1547e00638
-
SHA256
f1cc45caf2b1c60219840f6794ed2d15721cf1a86c96d1f3d4fb822d302c09fc
-
SHA512
999496ee879121686e042153a0553edf2ac3be8acb0322a24f7e7a2cdc1558302eba61f4aa6a4208bced7c86e01cbdf050df5c4406ee45d14ed30c3845788eed
-
SSDEEP
6144:LOYGXaPNxdgSdcq2pVZPOJHAbKjyIfd5ZbGdCmHgE5lN:fGqN/XdctpVtkz/fd5ZQgEHN
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Deletes itself
-
Loads dropped DLL
-
Registers COM server for autorun
-