General
-
Target
2acba15b1c90192f22dd2115fb3cd0bdb4ca815d46d7f5c96c166acae782ade7
-
Size
200KB
-
Sample
241120-cvq5msyhjl
-
MD5
60a4887782152c9150471daaf3df61a3
-
SHA1
69b3931f92b1e2b6b149c35a421a0c74796bf83f
-
SHA256
2acba15b1c90192f22dd2115fb3cd0bdb4ca815d46d7f5c96c166acae782ade7
-
SHA512
7783d5257322677d0395fd72421c985a685e4aa522c8426a189be257a13a6c5114fd86ce9db563098fc713d5271a111db9892e4c4d7feb413d4fa758aa5d6bbc
-
SSDEEP
3072:Am2y/GdyjktGDWLS0HZWD5w8K7Nk9LD7IBUzlwCDuRdj95ksW:Am2k4ztGiL3HJk9LD7bpwC6Rdj95kv
Static task
static1
Behavioral task
behavioral1
Sample
2acba15b1c90192f22dd2115fb3cd0bdb4ca815d46d7f5c96c166acae782ade7.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2acba15b1c90192f22dd2115fb3cd0bdb4ca815d46d7f5c96c166acae782ade7.doc
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://moisesdavid.com/qoong/vy/
http://insurancebabu.com/wp-admin/iXElcu9f/
http://rishi99.com/framework.impossible/dhADGeie6/
https://www.alertpage.net/confirmation/2nX/
https://anttarc.org/chartaxd/DMBuiwf5u/
Targets
-
-
Target
2acba15b1c90192f22dd2115fb3cd0bdb4ca815d46d7f5c96c166acae782ade7
-
Size
200KB
-
MD5
60a4887782152c9150471daaf3df61a3
-
SHA1
69b3931f92b1e2b6b149c35a421a0c74796bf83f
-
SHA256
2acba15b1c90192f22dd2115fb3cd0bdb4ca815d46d7f5c96c166acae782ade7
-
SHA512
7783d5257322677d0395fd72421c985a685e4aa522c8426a189be257a13a6c5114fd86ce9db563098fc713d5271a111db9892e4c4d7feb413d4fa758aa5d6bbc
-
SSDEEP
3072:Am2y/GdyjktGDWLS0HZWD5w8K7Nk9LD7IBUzlwCDuRdj95ksW:Am2k4ztGiL3HJk9LD7bpwC6Rdj95kv
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-