General
-
Target
c6a955feba1b9e85859176043a1a274c
-
Size
539KB
-
Sample
240313-xxsrgafd43
-
MD5
c6a955feba1b9e85859176043a1a274c
-
SHA1
31e397116cb4a2ec8188f9b51c0b980389031689
-
SHA256
25b1a6b2d713499b4d483d782626ff8f8622bfa1b078a6641d2efbe615db1ffd
-
SHA512
8c06e70f6b85011f82ef45fc9f605722b4a6037aea8340482dbafd68bbd647a69fbd028fbb9cbf69f7b4250de65013cb76a8c082af746b67f7d68d47a56451bf
-
SSDEEP
12288:hV9iQsDr8NQhqNrdjqLCV8L/EnqO1BKI9vIOaCuQByhC1A5/U:hVXkr8NpNrAmqL/EnJ1BsrPzhN5M
Behavioral task
behavioral1
Sample
c6a955feba1b9e85859176043a1a274c.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c6a955feba1b9e85859176043a1a274c.doc
Resource
win10v2004-20240226-en
Malware Config
Extracted
hancitor
0308_spnv5
http://priekornat.com/8/forum.php
http://stionsomi.ru/8/forum.php
http://arviskeist.ru/8/forum.php
Targets
-
-
Target
c6a955feba1b9e85859176043a1a274c
-
Size
539KB
-
MD5
c6a955feba1b9e85859176043a1a274c
-
SHA1
31e397116cb4a2ec8188f9b51c0b980389031689
-
SHA256
25b1a6b2d713499b4d483d782626ff8f8622bfa1b078a6641d2efbe615db1ffd
-
SHA512
8c06e70f6b85011f82ef45fc9f605722b4a6037aea8340482dbafd68bbd647a69fbd028fbb9cbf69f7b4250de65013cb76a8c082af746b67f7d68d47a56451bf
-
SSDEEP
12288:hV9iQsDr8NQhqNrdjqLCV8L/EnqO1BKI9vIOaCuQByhC1A5/U:hVXkr8NpNrAmqL/EnJ1BsrPzhN5M
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-