General
-
Target
document_A614_Jun_2.zip
-
Size
1KB
-
Sample
230602-qtmygsbe97
-
MD5
2fe59c7115b258f111be4777ab0fbd6e
-
SHA1
0e6c39f865401ff5a62505aa37128c87897111a9
-
SHA256
e0e130031ddaebb509d8d90a35250a521e074a1d2be5b7d6ff5aad66422a3898
-
SHA512
1e1943f77c3d0408ac4b242cdcc002720bd7cc208c2e71c4bd87b14ece03b1e62a11aa4a21a8641de9b967b8f661bdf17e9861428e4ef0473b88eaef81734bc2
Static task
static1
Behavioral task
behavioral1
Sample
document_A614_Jun_2.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
document_A614_Jun_2.js
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
document_A614_Jun_2.js
-
Size
4KB
-
MD5
230443f8af047c8b4597903328500b43
-
SHA1
ce7861a9fca90884c3e34ef99507a59fd636153f
-
SHA256
c6aab235f1835b6a4ac64c0293f9814c0bac0f5b99e5ae345ad1c1dee5e5c408
-
SHA512
ca3dec226aedd3fff58daefdc35fa49fd8639cdb9e5f9b8d097799b3a1e5d12230ef85b3d32e249e0066ee0a2345ed6a7019a7bffa8123fd8e0008a9d8d2273d
-
SSDEEP
96:tt6seA96t3/y/H/CgWn2JUeSVKFmopZ4z2V9:tt6TA96t3/y/H/CB2IVkWz+
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-