General
-
Target
Y44605116doc.doc
-
Size
175KB
-
Sample
230630-s9y2ssdg35
-
MD5
f8ab6670f00a035e68134a7fd4dcb264
-
SHA1
0fd60d0c821d6aa014171a05b7678a21b05056fe
-
SHA256
f794639d67379bfe9c95c945acab77981d8f44fc8d75e2566e09aaff420cb280
-
SHA512
f4f48f82ec065a0e7aaa2ae57eceeaead5b5ad7ff49b73cbaf332bf5329888714a8819aa64a95aabdec6471596f299d2a2c20e4557425e4da722d99cdbe5e45c
-
SSDEEP
3072:V4PrXcuQuvpzm4bkiaMQgAlSzgFFaMtUKIM0+oy3aQ6GamQlRQ:iDRv1m4bnQgISzgF1tU7M0+oy3aQ6GaC
Behavioral task
behavioral1
Sample
Y44605116doc.doc
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Y44605116doc.doc
Resource
win10v2004-20230621-en
Malware Config
Extracted
http://www.greaudstudio.com/docs/olohz_suq_munasyr/
http://www.gravelrecords.com/wp-admin/5h_jns_l3s6/
http://gtsouth.com/drinkmenu/38vq_z8al_r5cujfy90n/
http://groncrete.com/bower_components/cvbh8_f0_84rai/
http://www.gunesoluk.com/eotps/heb_x_1ehlbx9/
Targets
-
-
Target
Y44605116doc.doc
-
Size
175KB
-
MD5
f8ab6670f00a035e68134a7fd4dcb264
-
SHA1
0fd60d0c821d6aa014171a05b7678a21b05056fe
-
SHA256
f794639d67379bfe9c95c945acab77981d8f44fc8d75e2566e09aaff420cb280
-
SHA512
f4f48f82ec065a0e7aaa2ae57eceeaead5b5ad7ff49b73cbaf332bf5329888714a8819aa64a95aabdec6471596f299d2a2c20e4557425e4da722d99cdbe5e45c
-
SSDEEP
3072:V4PrXcuQuvpzm4bkiaMQgAlSzgFFaMtUKIM0+oy3aQ6GamQlRQ:iDRv1m4bnQgISzgF1tU7M0+oy3aQ6GaC
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-