General
-
Target
912d4577fff64d062e613da735f17991
-
Size
451KB
-
Sample
240205-gaxh5sdgdj
-
MD5
912d4577fff64d062e613da735f17991
-
SHA1
1dea29b7e9639ced1f5713b77a53d063c44dffc2
-
SHA256
d387bb7970545808dc199de51b482ccb4faf5e8e1df678bc9116a81d51b0bc32
-
SHA512
df116217c51add87a8b861c912ff47f05af35b38740e152796f0435f1ff563cb2b79e39a8c18a830ea35d21a839420443e661df24d1ed499aef4d2cc5ce2cdf6
-
SSDEEP
6144:WqVCgeFRmJMYjTkRFr8NWJIfXzigjcmPYeKfhi3aS1vJO4OzBtYOlV7J4MtAKY0/:zV9iQsDr8NXrLTQr0aCwSYRY038TW
Behavioral task
behavioral1
Sample
912d4577fff64d062e613da735f17991.doc
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
912d4577fff64d062e613da735f17991.doc
Resource
win10v2004-20231215-en
Malware Config
Extracted
hancitor
2508_bqplf
http://intakinger.com/8/forum.php
http://idgentexpliet.ru/8/forum.php
http://declassivan.ru/8/forum.php
Targets
-
-
Target
912d4577fff64d062e613da735f17991
-
Size
451KB
-
MD5
912d4577fff64d062e613da735f17991
-
SHA1
1dea29b7e9639ced1f5713b77a53d063c44dffc2
-
SHA256
d387bb7970545808dc199de51b482ccb4faf5e8e1df678bc9116a81d51b0bc32
-
SHA512
df116217c51add87a8b861c912ff47f05af35b38740e152796f0435f1ff563cb2b79e39a8c18a830ea35d21a839420443e661df24d1ed499aef4d2cc5ce2cdf6
-
SSDEEP
6144:WqVCgeFRmJMYjTkRFr8NWJIfXzigjcmPYeKfhi3aS1vJO4OzBtYOlV7J4MtAKY0/:zV9iQsDr8NXrLTQr0aCwSYRY038TW
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-