General
-
Target
PTD080120ZGO082920.doc
-
Size
223KB
-
Sample
240920-dr2bwawelq
-
MD5
21b3a9b03027779dc3070481a468b211
-
SHA1
6cbaadce0d5e96e9183d01363e26ea7fe8c6cc62
-
SHA256
7dc9821a27cbc29bddb4bb3c708aad0b24a82d9beb1a2df9caeabf7ea6bd8e06
-
SHA512
1b2146c0c83cdb7e438465225d7b10813ccf47ee37bc9b13ec6a1572c56f494359a7252218262a0003ab5cf820ab69baf67ba48bf60b448e65ffca0388a98b71
-
SSDEEP
3072:P7Yy0u8YGgjv+ZvchmkHcI/o1/Vb6//////////////////////////////////E:10uXnWFchmmcI/o1/NO5j4nwKz7Oc
Behavioral task
behavioral1
Sample
PTD080120ZGO082920.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PTD080120ZGO082920.doc
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://qstride.com/img/0/
http://tskgear.com/wp-content/uploads/2015/06/pz/
http://vermasiyaahi.com/cgi-bin/8/
http://www.weblabor.com.br/avisos/QIU9/
http://viniciusrangel.com/experimental/VIhMh1/
http://westvac.com/wp-content/GOYx/
https://viewall.eu/cgi-bin/SbhZP9X/
Targets
-
-
Target
PTD080120ZGO082920.doc
-
Size
223KB
-
MD5
21b3a9b03027779dc3070481a468b211
-
SHA1
6cbaadce0d5e96e9183d01363e26ea7fe8c6cc62
-
SHA256
7dc9821a27cbc29bddb4bb3c708aad0b24a82d9beb1a2df9caeabf7ea6bd8e06
-
SHA512
1b2146c0c83cdb7e438465225d7b10813ccf47ee37bc9b13ec6a1572c56f494359a7252218262a0003ab5cf820ab69baf67ba48bf60b448e65ffca0388a98b71
-
SSDEEP
3072:P7Yy0u8YGgjv+ZvchmkHcI/o1/Vb6//////////////////////////////////E:10uXnWFchmmcI/o1/NO5j4nwKz7Oc
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-