General
-
Target
1word.doc
-
Size
188KB
-
Sample
240222-af81ssha2x
-
MD5
349d13ca99ab03869548d75b99e5a1d0
-
SHA1
1b3e94bd3bcc8b7a227c118c536a52bc90d81a90
-
SHA256
d34849e1c97f9e615b3a9b800ca1f11ed04a92b1014f55aa0158e3fffc22d78f
-
SHA512
d931b526e072b5b88285b50bf4f4dec8662827c97f2e14551469f7c2d70bb1e85a2ce80b4a843254b189aaebc90178297ec85d48b912b4d88c2ef3f1059cbaa3
-
SSDEEP
3072:cv4tcTvjvTY140818tIP4ovpk2xTednwR:ftcnvE140o8tIP4apk+TednwR
Behavioral task
behavioral1
Sample
1word.doc
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
1word.doc
Resource
win10v2004-20240221-en
Malware Config
Extracted
http://fortcollinsathletefactory.com/wp-admin/i/
http://getming.com/forum/p/
http://gaffa-music.com/cgi-bin/UM/
http://frankfurtelfarolillo.com/laseu/c7/
http://evilnerd.org/cgi-bin/nUi/
http://gapesmm.org/old/M/
http://grml.net/wp/C/
Targets
-
-
Target
1word.doc
-
Size
188KB
-
MD5
349d13ca99ab03869548d75b99e5a1d0
-
SHA1
1b3e94bd3bcc8b7a227c118c536a52bc90d81a90
-
SHA256
d34849e1c97f9e615b3a9b800ca1f11ed04a92b1014f55aa0158e3fffc22d78f
-
SHA512
d931b526e072b5b88285b50bf4f4dec8662827c97f2e14551469f7c2d70bb1e85a2ce80b4a843254b189aaebc90178297ec85d48b912b4d88c2ef3f1059cbaa3
-
SSDEEP
3072:cv4tcTvjvTY140818tIP4ovpk2xTednwR:ftcnvE140o8tIP4apk+TednwR
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-