General
-
Target
Zapitvane_MACH_BULGARIA_EOOD_09_2023.doc
-
Size
199KB
-
Sample
230914-slq2aafd93
-
MD5
3b92906782599469acffd05ba041942e
-
SHA1
522183445616d131f3edf13e6ea93c9f19c9f52f
-
SHA256
edce16eadba8d19990b2ff2e97420f07c1f4defe813ffe961f9cd777f8368b7b
-
SHA512
c1f8a1259327db79f98467d2a9e2dce172c39e78541476722863eb7b6fa5c39f41c39ad574e7e0b65ed4ab0d8a7201665df1463f2aeaa2d456634c94e71e0f33
-
SSDEEP
3072:NAN+svPwMrFoXiURMf8yS/TSTIs6sCbMD3itIm0QqgxJi+m:W33JodRU8yS/dLsZDyp0QZC
Behavioral task
behavioral1
Sample
Zapitvane_MACH_BULGARIA_EOOD_09_2023.doc
Resource
win7-20230831-en
Malware Config
Extracted
bitrat
1.38
185.225.75.68:3569
-
communication_password
0edcbe7d888380c49e7d1dcf67b6ea6e
-
tor_process
tor
Targets
-
-
Target
Zapitvane_MACH_BULGARIA_EOOD_09_2023.doc
-
Size
199KB
-
MD5
3b92906782599469acffd05ba041942e
-
SHA1
522183445616d131f3edf13e6ea93c9f19c9f52f
-
SHA256
edce16eadba8d19990b2ff2e97420f07c1f4defe813ffe961f9cd777f8368b7b
-
SHA512
c1f8a1259327db79f98467d2a9e2dce172c39e78541476722863eb7b6fa5c39f41c39ad574e7e0b65ed4ab0d8a7201665df1463f2aeaa2d456634c94e71e0f33
-
SSDEEP
3072:NAN+svPwMrFoXiURMf8yS/TSTIs6sCbMD3itIm0QqgxJi+m:W33JodRU8yS/dLsZDyp0QZC
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-