General
-
Target
Hybrid Warefare.docx
-
Size
1.3MB
-
Sample
240308-yggvpsef73
-
MD5
d8df558c411548de703b56eac8e05143
-
SHA1
b0c489a139435bbdf7b565fa70733b7fda1c660e
-
SHA256
acbfbf6fd00fa347a52657e5ca0f5cc6cbcf197a04e2d3fd5dc9235926b319d7
-
SHA512
caff566ce0a18567b6a39a84d98dc54ec67fe7c1122c245b454ac54667a0144615de9b29370c5e68b2f89dcb2f8b0fa1cae960d14813a88d78e7e4524f8e6faa
-
SSDEEP
24576:0EkS4d0mA42vni/50WwiA6lMxjcs2IqRI+pFtZUFPFSvPX+:XhI0A+ih+H6lcj/27I+jtGjwO
Static task
static1
Behavioral task
behavioral1
Sample
Hybrid Warefare.docx
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Hybrid Warefare.docx
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
Hybrid Warefare.docx
-
Size
1.3MB
-
MD5
d8df558c411548de703b56eac8e05143
-
SHA1
b0c489a139435bbdf7b565fa70733b7fda1c660e
-
SHA256
acbfbf6fd00fa347a52657e5ca0f5cc6cbcf197a04e2d3fd5dc9235926b319d7
-
SHA512
caff566ce0a18567b6a39a84d98dc54ec67fe7c1122c245b454ac54667a0144615de9b29370c5e68b2f89dcb2f8b0fa1cae960d14813a88d78e7e4524f8e6faa
-
SSDEEP
24576:0EkS4d0mA42vni/50WwiA6lMxjcs2IqRI+pFtZUFPFSvPX+:XhI0A+ih+H6lcj/27I+jtGjwO
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Abuses OpenXML format to download file from external location
-