General
-
Target
81c4485a834880c3becd7e3eefd841a3
-
Size
850KB
-
Sample
231219-xzwk5sdeh2
-
MD5
81c4485a834880c3becd7e3eefd841a3
-
SHA1
a1d76eaf5c4f787fc34528e46dc9cda5d9d5ea28
-
SHA256
87df253ffe9d319d5a315b3361a1d13553c3bc4bf233e5c93a8624b5993f4abe
-
SHA512
09076ecc53e4ad0d27c783918ca6c74dbf81cdb11c47c232afe8044e372aeb4920a488e1320c0cad9267d2fb747e2dc3e9e7c265021bba6b3dbec14daffe104f
-
SSDEEP
12288:OB+jxjYxBs/RPYdf2aCQeg1Mfpfm6ukJm9voPZqXStgi2Tz:OSjeG/usvQFMfQmJmVsZ/C/
Behavioral task
behavioral1
Sample
81c4485a834880c3becd7e3eefd841a3.doc
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
81c4485a834880c3becd7e3eefd841a3.doc
Resource
win10v2004-20231215-en
Malware Config
Extracted
hancitor
0710_pkrdv
http://strictence.com/8/forum.php
http://wimberels.ru/8/forum.php
http://cithernista.ru/8/forum.php
Targets
-
-
Target
81c4485a834880c3becd7e3eefd841a3
-
Size
850KB
-
MD5
81c4485a834880c3becd7e3eefd841a3
-
SHA1
a1d76eaf5c4f787fc34528e46dc9cda5d9d5ea28
-
SHA256
87df253ffe9d319d5a315b3361a1d13553c3bc4bf233e5c93a8624b5993f4abe
-
SHA512
09076ecc53e4ad0d27c783918ca6c74dbf81cdb11c47c232afe8044e372aeb4920a488e1320c0cad9267d2fb747e2dc3e9e7c265021bba6b3dbec14daffe104f
-
SSDEEP
12288:OB+jxjYxBs/RPYdf2aCQeg1Mfpfm6ukJm9voPZqXStgi2Tz:OSjeG/usvQFMfQmJmVsZ/C/
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-