General
-
Target
Rech1075478616DEMai232019.doc
-
Size
125KB
-
Sample
230630-sw97xaef6w
-
MD5
659f175cbd422379fe3a6a63c5b1f640
-
SHA1
61af3732c39c9ec9e6b0bd1234eba2ccfe8a42e6
-
SHA256
5d7bd5ab1f0ef9fe49f97b49fc955f64a9878fc341650143d572b24126f1284b
-
SHA512
bfe05e59cce39f8747a0ee1186a4a4f6d8834882972bf238f0dcd6743314871df4cb11e824e382ed95cb29808e7e0d75d6ab6d3aec69532d7865171a5e50aa87
-
SSDEEP
3072:S77HUUUUUUUUUUUUUUUUUUUTkOQePu5U8q/tr0mXSSBgfy1:S77HUUUUUUUUUUUUUUUUUUUT52V8r0mj
Static task
static1
Behavioral task
behavioral1
Sample
Rech1075478616DEMai232019.doc
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Rech1075478616DEMai232019.doc
Resource
win10v2004-20230621-en
Malware Config
Extracted
https://atlanticsg.com/wp-includes/fsfrz22_mkp29qlby-69478/
http://eastpennlandscape.com/css/qhJUtdBFvM/
http://mcs-interiors.co.uk/cgi-bin/MUbadZUIXD/
http://laderajabugo.navicu.com/wp-admin/6ohv5j_6m40d-4652183/
http://banphongresort.com/wp-includes/8hxbg02o_wkpvf-27459009/
Targets
-
-
Target
Rech1075478616DEMai232019.doc
-
Size
125KB
-
MD5
659f175cbd422379fe3a6a63c5b1f640
-
SHA1
61af3732c39c9ec9e6b0bd1234eba2ccfe8a42e6
-
SHA256
5d7bd5ab1f0ef9fe49f97b49fc955f64a9878fc341650143d572b24126f1284b
-
SHA512
bfe05e59cce39f8747a0ee1186a4a4f6d8834882972bf238f0dcd6743314871df4cb11e824e382ed95cb29808e7e0d75d6ab6d3aec69532d7865171a5e50aa87
-
SSDEEP
3072:S77HUUUUUUUUUUUUUUUUUUUTkOQePu5U8q/tr0mXSSBgfy1:S77HUUUUUUUUUUUUUUUUUUUT52V8r0mj
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-