General
-
Target
SMTP-FGMet32ptD1LBKpl9d-c5baf9b10bb63f546bf7d153f7d50c78.doc
-
Size
556KB
-
Sample
240903-hmpvha1fng
-
MD5
c5baf9b10bb63f546bf7d153f7d50c78
-
SHA1
1fb83f290da89601642efb47731f3ae5e6f204b5
-
SHA256
ce76f02cf57092e33b1daf8a41af4b3d2804a9579e801644318dca35af842d54
-
SHA512
19cdc68feb78e35e72ee01f83e69cc61855ae5521fb5265bb9249c3f7eff1722b09d720243d3c527bbda02c5390086aeffc0b5485cded0356c037bd9dd23a211
-
SSDEEP
12288:5+xWSu1Cq113pE2DvTlEZ4E0/Pygf2eSoPvIHBUTtp:5UW1Cqz3/K4E0/qYSoPvISv
Static task
static1
Behavioral task
behavioral1
Sample
SMTP-FGMet32ptD1LBKpl9d-c5baf9b10bb63f546bf7d153f7d50c78.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SMTP-FGMet32ptD1LBKpl9d-c5baf9b10bb63f546bf7d153f7d50c78.xls
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
SMTP-FGMet32ptD1LBKpl9d-c5baf9b10bb63f546bf7d153f7d50c78.doc
-
Size
556KB
-
MD5
c5baf9b10bb63f546bf7d153f7d50c78
-
SHA1
1fb83f290da89601642efb47731f3ae5e6f204b5
-
SHA256
ce76f02cf57092e33b1daf8a41af4b3d2804a9579e801644318dca35af842d54
-
SHA512
19cdc68feb78e35e72ee01f83e69cc61855ae5521fb5265bb9249c3f7eff1722b09d720243d3c527bbda02c5390086aeffc0b5485cded0356c037bd9dd23a211
-
SSDEEP
12288:5+xWSu1Cq113pE2DvTlEZ4E0/Pygf2eSoPvIHBUTtp:5UW1Cqz3/K4E0/qYSoPvISv
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Evasion via Device Credential Deployment
-
Drops file in System32 directory
-