General
-
Target
Document_45.zip
-
Size
1KB
-
Sample
230829-pellfafd41
-
MD5
846c0d4a4a5f2774a69bbf6988dfdcd8
-
SHA1
d49d4b92cc000bc7f1c9ac99267cb8065e72ba57
-
SHA256
c8617f2c6432c96c35b9142798530695511d45a1fb780f33b122542ee9dc3e8a
-
SHA512
4440bd36d8af55aaf05dcfe08727bf444a7da3e1d27770cd66329aaeb912173e093d9ce068232c06a2bf5dc71e70b62aef16980571d1c8146c00183a31592448
Static task
static1
Behavioral task
behavioral1
Sample
Document_45/Document_45.doc.lnk
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Document_45/Document_45.doc.lnk
Resource
win10v2004-20230703-en
Malware Config
Extracted
http://twizt.net/s.exe
Targets
-
-
Target
Document_45/Document_45.doc.lnk
-
Size
1KB
-
MD5
c7eb920f5717b5911ca1565067a5a314
-
SHA1
aad1960e04ce48f707fe297e17eeb0cbe2ddbb83
-
SHA256
b3dac534d0ce19efdf1aa37718283318e94a82446b3fad721076bb63f427eee3
-
SHA512
5baab10dfe542581f4ec2e38fd5481c2d6d69192c6775de5e2326e73b3547d46a61608fae55082f184ef1c5d613358bfcca067c18514668d9842e95be6d7533b
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-