General
-
Target
946f2b7669561b2d71bca59bdfa02ff82cb580eb6df077c325b20618a4d8b800
-
Size
213KB
-
Sample
241120-1mq2nsvcqn
-
MD5
2d87858d2d5eb98d8e026d07a0fbc371
-
SHA1
f811c8a6d76611956533bdd4b6e1fac82706730b
-
SHA256
946f2b7669561b2d71bca59bdfa02ff82cb580eb6df077c325b20618a4d8b800
-
SHA512
0d28f276a638137bff7bd0c55f182fd336c360c4aa2a8436e3168baa0ef986281ad4d0f5916f923ad9da248a43033bce240b13a67566e97cf3ce5aa7e41e756d
-
SSDEEP
6144:FF2k4WtGiL3HJk9tD7bdgyD9Wv4G4IFbL:FFvQitkb7bC1bL
Behavioral task
behavioral1
Sample
946f2b7669561b2d71bca59bdfa02ff82cb580eb6df077c325b20618a4d8b800.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
946f2b7669561b2d71bca59bdfa02ff82cb580eb6df077c325b20618a4d8b800.doc
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://diwafashions.com/wp-admin/mqau6/
http://designers.hotcom-web.com/ubkskw29clek/qnpm1p/
http://dixartcontractors.com/cgi-bin/nnuv/
http://diaspotv.info/wordpress/G/
http://easyvisaoverseas.com/cgi-bin/v/
Targets
-
-
Target
946f2b7669561b2d71bca59bdfa02ff82cb580eb6df077c325b20618a4d8b800
-
Size
213KB
-
MD5
2d87858d2d5eb98d8e026d07a0fbc371
-
SHA1
f811c8a6d76611956533bdd4b6e1fac82706730b
-
SHA256
946f2b7669561b2d71bca59bdfa02ff82cb580eb6df077c325b20618a4d8b800
-
SHA512
0d28f276a638137bff7bd0c55f182fd336c360c4aa2a8436e3168baa0ef986281ad4d0f5916f923ad9da248a43033bce240b13a67566e97cf3ce5aa7e41e756d
-
SSDEEP
6144:FF2k4WtGiL3HJk9tD7bdgyD9Wv4G4IFbL:FFvQitkb7bC1bL
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-