General
-
Target
ec22df822ebdbf9b4fb6510bd677ef0d6ce81e02ed4aaeedb098e178e7eafc9e
-
Size
217KB
-
Sample
241120-1nkw2symgm
-
MD5
9233375931f8df6643462a715a569356
-
SHA1
f1a9097241c4d4ab7501d7ac2fd863b657987ba6
-
SHA256
ec22df822ebdbf9b4fb6510bd677ef0d6ce81e02ed4aaeedb098e178e7eafc9e
-
SHA512
05ed488559f36a3fb3982800dc608299feb1600741c81c33c3138abf639a13af702426bf1e525d26f784ffdb549ed57ba16062f1cd3a51ab793a1b6c581ebb6a
-
SSDEEP
6144:le2k4ytGiL3HJk9uD7bEDYvj3iOE8B+nLZB3oXfg+03:lejQitkQ7bA
Static task
static1
Behavioral task
behavioral1
Sample
ec22df822ebdbf9b4fb6510bd677ef0d6ce81e02ed4aaeedb098e178e7eafc9e.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec22df822ebdbf9b4fb6510bd677ef0d6ce81e02ed4aaeedb098e178e7eafc9e.doc
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://gobabynames.com/dz6r/xytx7/
http://nhomkinhthienbinh.com/cgi-bin/yW/
http://capitalcitycarwash.com/komldk65kd/7tz/
http://compscischool.com/wp-content/8a1n/
http://gianphoisonghong.com/wp-includes/AUWxwq1V2s/
Targets
-
-
Target
ec22df822ebdbf9b4fb6510bd677ef0d6ce81e02ed4aaeedb098e178e7eafc9e
-
Size
217KB
-
MD5
9233375931f8df6643462a715a569356
-
SHA1
f1a9097241c4d4ab7501d7ac2fd863b657987ba6
-
SHA256
ec22df822ebdbf9b4fb6510bd677ef0d6ce81e02ed4aaeedb098e178e7eafc9e
-
SHA512
05ed488559f36a3fb3982800dc608299feb1600741c81c33c3138abf639a13af702426bf1e525d26f784ffdb549ed57ba16062f1cd3a51ab793a1b6c581ebb6a
-
SSDEEP
6144:le2k4ytGiL3HJk9uD7bEDYvj3iOE8B+nLZB3oXfg+03:lejQitkQ7bA
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-