General
-
Target
204a8346a401f3101361c4571fe1c4bbedc9e54e4f5c181bb7c81cf843286730.doc
-
Size
554KB
-
Sample
240512-bex3kshb2t
-
MD5
c7372d16dc2ed8b7a0ffa8d9f2b6b0f2
-
SHA1
6ed09650439538b2d76ccfc23902416c419eac63
-
SHA256
204a8346a401f3101361c4571fe1c4bbedc9e54e4f5c181bb7c81cf843286730
-
SHA512
7f5d34ed62f89943e7dec3f2df49d6da54fbf9f996d0d3b7554871bb5c2afc60c65830760cb866092092284a9cd38310757ff718010124edaeb07e6e464a5d16
-
SSDEEP
12288:qC79BbmKy2AfG3CQ7nKS9LhS8jWxZIVEs0Rk4q:qW9BbmXGj9LCxaV6q
Behavioral task
behavioral1
Sample
204a8346a401f3101361c4571fe1c4bbedc9e54e4f5c181bb7c81cf843286730.doc
Resource
win7-20240221-en
Malware Config
Extracted
https://github.com/sdvsdv23rbfdb3/kjkj/raw/main/1
Extracted
https://github.com/bao3125/ff/raw/main/Documen.zip
Targets
-
-
Target
204a8346a401f3101361c4571fe1c4bbedc9e54e4f5c181bb7c81cf843286730.doc
-
Size
554KB
-
MD5
c7372d16dc2ed8b7a0ffa8d9f2b6b0f2
-
SHA1
6ed09650439538b2d76ccfc23902416c419eac63
-
SHA256
204a8346a401f3101361c4571fe1c4bbedc9e54e4f5c181bb7c81cf843286730
-
SHA512
7f5d34ed62f89943e7dec3f2df49d6da54fbf9f996d0d3b7554871bb5c2afc60c65830760cb866092092284a9cd38310757ff718010124edaeb07e6e464a5d16
-
SSDEEP
12288:qC79BbmKy2AfG3CQ7nKS9LhS8jWxZIVEs0Rk4q:qW9BbmXGj9LCxaV6q
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-