General
-
Target
351c3a50af2ad8170fe08c58d2c8a4b3f953e459291d1304efe966d292387a7c
-
Size
49KB
-
Sample
240520-gevv4seb22
-
MD5
5d6c6d1add2c6354c6dbe2c6b1c62434
-
SHA1
e544b80160dea1980b1a85934d8665ea02df9534
-
SHA256
351c3a50af2ad8170fe08c58d2c8a4b3f953e459291d1304efe966d292387a7c
-
SHA512
1471dc3d8302423f8daf431cb70cf49609cac3de05d87a6f7485088b494b162167440f650e19a8601a64502a6ee4dfb5800b28a8344c3c7316766861edcb2118
-
SSDEEP
1536:tvuQFIy5URkoePQHI2rtvsL5JMuBrqZO7WKB67Clh:1uQFl5+lsQHdrRe5JMUrPqKB67w
Behavioral task
behavioral1
Sample
82b065a48e969eb0200449e104f0b8a6.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
82b065a48e969eb0200449e104f0b8a6.doc
Resource
win10v2004-20240426-en
Malware Config
Extracted
http://uhlandstrasse.de/67Vl28/
http://muzykomani.pl/lenqx/
http://slytec.com/0FzJB/
http://smpadvance.com/fHOIVS2/
Targets
-
-
Target
82b065a48e969eb0200449e104f0b8a6
-
Size
106KB
-
MD5
82b065a48e969eb0200449e104f0b8a6
-
SHA1
678dae65881def594b5c68d305d23194565d1753
-
SHA256
71dabd0339fa65620cf867e4cd921620242f26305673ec15658e7cabf1b127b1
-
SHA512
864f5bc0b07f252c66ad06933b9701c5fb16c9043caac61907bd8b4322ecc08ede6d21e393c6a6d6335760a821656807ee2fa4963246d35a0cd0c34fd1b3435a
-
SSDEEP
1536:PwddNwTeLbS7vXRGzFQ+aggx9Gg2SuidngdAbHVJEO3xvU:mCeLmTX7x9Gg2SZdnPTXEmxv
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-