General
-
Target
d225efab3cf8f751c299accb3f114e9b
-
Size
612KB
-
Sample
240318-a568haca73
-
MD5
d225efab3cf8f751c299accb3f114e9b
-
SHA1
fdabc9901ed3b774b106859f4c5c0c3c1dcf1aef
-
SHA256
2ae278b49a16340323666bc486a2686491391374365393142e44a25c16b29465
-
SHA512
c0656fa0af6391c2568efe70b1b9ee0120eace96575f0c04ceea9d77aa94b6941b682257585097cef8fb661bf5944f9ab69792aa413173cb6300d361828bc672
-
SSDEEP
12288:EV9iQsDr8N5eCz3DFw7m/kdxoF3aHUp6BvNoywaMFsZjjotAd5Rs+:EVXkr8N8Cz6voFqDisSIj
Behavioral task
behavioral1
Sample
d225efab3cf8f751c299accb3f114e9b.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d225efab3cf8f751c299accb3f114e9b.doc
Resource
win10v2004-20240226-en
Malware Config
Extracted
hancitor
1808_plfr
http://madmilons.com/8/forum.php
http://counteent.ru/8/forum.php
http://simatereare.ru/8/forum.php
Targets
-
-
Target
d225efab3cf8f751c299accb3f114e9b
-
Size
612KB
-
MD5
d225efab3cf8f751c299accb3f114e9b
-
SHA1
fdabc9901ed3b774b106859f4c5c0c3c1dcf1aef
-
SHA256
2ae278b49a16340323666bc486a2686491391374365393142e44a25c16b29465
-
SHA512
c0656fa0af6391c2568efe70b1b9ee0120eace96575f0c04ceea9d77aa94b6941b682257585097cef8fb661bf5944f9ab69792aa413173cb6300d361828bc672
-
SSDEEP
12288:EV9iQsDr8N5eCz3DFw7m/kdxoF3aHUp6BvNoywaMFsZjjotAd5Rs+:EVXkr8N8Cz6voFqDisSIj
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-