General
-
Target
0b22278ddb598d63f07eb983bcf307e0852cd3005c5bc15d4a4f26455562c8ec
-
Size
1.3MB
-
Sample
240527-mzcsxshh42
-
MD5
14f4c470c207e22c3b0a4efa7b4200e8
-
SHA1
21180195396580a9ade32b589490cf3bc94d3b5b
-
SHA256
0b22278ddb598d63f07eb983bcf307e0852cd3005c5bc15d4a4f26455562c8ec
-
SHA512
4adc4275a9105bf94bdce4b9d5821026d99a4adf16579b1b2b23495efbd55cc7bc90a129248a9902c7c75828eac9ac665c8a34c203b428748d9f7b8a80b76823
-
SSDEEP
24576:nEIjrPUaphvGvGUZ93/semhXp7AsWIKHaY8k5faaboEy6r8zz1:n/jhvGvGU93097AFIKbv0WY/1
Behavioral task
behavioral1
Sample
0b22278ddb598d63f07eb983bcf307e0852cd3005c5bc15d4a4f26455562c8ec.doc
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0b22278ddb598d63f07eb983bcf307e0852cd3005c5bc15d4a4f26455562c8ec.doc
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
0b22278ddb598d63f07eb983bcf307e0852cd3005c5bc15d4a4f26455562c8ec
-
Size
1.3MB
-
MD5
14f4c470c207e22c3b0a4efa7b4200e8
-
SHA1
21180195396580a9ade32b589490cf3bc94d3b5b
-
SHA256
0b22278ddb598d63f07eb983bcf307e0852cd3005c5bc15d4a4f26455562c8ec
-
SHA512
4adc4275a9105bf94bdce4b9d5821026d99a4adf16579b1b2b23495efbd55cc7bc90a129248a9902c7c75828eac9ac665c8a34c203b428748d9f7b8a80b76823
-
SSDEEP
24576:nEIjrPUaphvGvGUZ93/semhXp7AsWIKHaY8k5faaboEy6r8zz1:n/jhvGvGU93097AFIKbv0WY/1
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-