General
-
Target
01b4c1b05cda2b5f8683735cfd3169d6
-
Size
431KB
-
Sample
231229-x6jvxsbaaj
-
MD5
01b4c1b05cda2b5f8683735cfd3169d6
-
SHA1
1fd8b0546820602d93b2f66abd6214ebe6b1dd17
-
SHA256
1daf0bbe815341fd6e81fcf7685c519e25a70f29bab084d7f9e5cdb335622081
-
SHA512
debd6396319466fac726ba9214129526e316876e7d6ca7b0335ed08c59d03ef1fad85fc9ad9a8ec98ea3a3b31d88b920953c1e43215426604ee4d03e3666e361
-
SSDEEP
12288:4V9iQsDr8NnClDfKTFi1w06/vbOes1AOrk4P:4VXkr8NCNfKB30AOesoI
Behavioral task
behavioral1
Sample
01b4c1b05cda2b5f8683735cfd3169d6.doc
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01b4c1b05cda2b5f8683735cfd3169d6.doc
Resource
win10v2004-20231222-en
Malware Config
Extracted
hancitor
3008_hsdj8
http://buichely.com/8/forum.php
http://gratimen.ru/8/forum.php
http://waliteriter.ru/8/forum.php
Targets
-
-
Target
01b4c1b05cda2b5f8683735cfd3169d6
-
Size
431KB
-
MD5
01b4c1b05cda2b5f8683735cfd3169d6
-
SHA1
1fd8b0546820602d93b2f66abd6214ebe6b1dd17
-
SHA256
1daf0bbe815341fd6e81fcf7685c519e25a70f29bab084d7f9e5cdb335622081
-
SHA512
debd6396319466fac726ba9214129526e316876e7d6ca7b0335ed08c59d03ef1fad85fc9ad9a8ec98ea3a3b31d88b920953c1e43215426604ee4d03e3666e361
-
SSDEEP
12288:4V9iQsDr8NnClDfKTFi1w06/vbOes1AOrk4P:4VXkr8NCNfKB30AOesoI
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-