General
-
Target
e7b60a638ac578b594cff9aade9c17415854f1d527a1974db092d0772e676819
-
Size
213KB
-
Sample
241120-1p9xkaynap
-
MD5
ae750ae1d56d6c70f5b93344d70218b6
-
SHA1
49736f692f34f59e3640be867924542c67797247
-
SHA256
e7b60a638ac578b594cff9aade9c17415854f1d527a1974db092d0772e676819
-
SHA512
13c756b5ffcc987b645ffdd0febc6a63a60a2021889b562268cc134ea4cfb9fc460af9365de3a857246e749bea68e14fb2c28137337a986dfb2db639edb9fb50
-
SSDEEP
6144:7n2k4ctGiL3HJk9TD7bb5HDWWv9EvIFbL:7n9Qitk57bNVbL
Behavioral task
behavioral1
Sample
e7b60a638ac578b594cff9aade9c17415854f1d527a1974db092d0772e676819.doc
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e7b60a638ac578b594cff9aade9c17415854f1d527a1974db092d0772e676819.doc
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://diwafashions.com/wp-admin/mqau6/
http://designers.hotcom-web.com/ubkskw29clek/qnpm1p/
http://dixartcontractors.com/cgi-bin/nnuv/
http://diaspotv.info/wordpress/G/
http://easyvisaoverseas.com/cgi-bin/v/
Targets
-
-
Target
e7b60a638ac578b594cff9aade9c17415854f1d527a1974db092d0772e676819
-
Size
213KB
-
MD5
ae750ae1d56d6c70f5b93344d70218b6
-
SHA1
49736f692f34f59e3640be867924542c67797247
-
SHA256
e7b60a638ac578b594cff9aade9c17415854f1d527a1974db092d0772e676819
-
SHA512
13c756b5ffcc987b645ffdd0febc6a63a60a2021889b562268cc134ea4cfb9fc460af9365de3a857246e749bea68e14fb2c28137337a986dfb2db639edb9fb50
-
SSDEEP
6144:7n2k4ctGiL3HJk9TD7bb5HDWWv9EvIFbL:7n9Qitk57bNVbL
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-