General
-
Target
test.zip
-
Size
1KB
-
Sample
241013-wlawvazdnd
-
MD5
edf500aac9f88dbb79a77e3b6cf0f77b
-
SHA1
f51aa2684b80501518d0c3642021663a99570fe6
-
SHA256
9d3dbbde9112374e740ac6a646ab64e55281226b50e3f27348b2d83fb4a96085
-
SHA512
7a939952d4693204d41cc3d120dd344ca013bf5ae207da9b3f1f9fc682e60caaf70ffbcc661b9d870239925c73a1e404e065944dac3332474a38a6fca43647e6
Static task
static1
Behavioral task
behavioral1
Sample
test.rtf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
test.rtf
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
test.doc
-
Size
2KB
-
MD5
f5fc224eb5cbbff8ee4bf4670ed9611a
-
SHA1
8e3f85dd6fb94da77990987bd26bde7e59042490
-
SHA256
80f7f23bea03b2386ae91e156835c2a685d9515e0c42f4dd89f782d64a29f701
-
SHA512
4902cd1f9f166a2bc3136276e2baf251e40dc196885be38e8b38f034fa9829b390c82a9ea9474cb11c3f84460997540489a3455d327ae62ae7f95f78131f8330
Score8/10-
Blocklisted process makes network request
-
Legitimate hosting services abused for malware hosting/C2
-