General
-
Target
572fb97b1fec24c598ccb6113fa40a3c81c1c6d0e1d01f1611920c131cbeca7c
-
Size
167KB
-
Sample
241120-l7d6aawcjl
-
MD5
0898b0beac0d89db7a616cd49676b951
-
SHA1
ba58393c0d3dc1f9cbdfa66351254c30b126503d
-
SHA256
572fb97b1fec24c598ccb6113fa40a3c81c1c6d0e1d01f1611920c131cbeca7c
-
SHA512
6dc84807ed898aa96b9cc04d4f2bd1cbf6f211345dc3fc627111578bdee24a9a7f38eb2b5f9acab12637183546bdae1da1f3df2f6847b6949d3fe0cffc8b92bc
-
SSDEEP
3072:3/AwBB2sniZEg43bOp9AtdLaMigcOWwVW8KQlanxvlqYp+9bzbDgEarpHfR+yUJ1:zJiP/w2PZevVnL+JA8lX1h9a
Static task
static1
Behavioral task
behavioral1
Sample
572fb97b1fec24c598ccb6113fa40a3c81c1c6d0e1d01f1611920c131cbeca7c.doc
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
572fb97b1fec24c598ccb6113fa40a3c81c1c6d0e1d01f1611920c131cbeca7c.doc
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://rossie.in/wp/6L0U/
https://envirohubconsulting.co.za/cgi-bin/vI5/
https://grandages.org.my/office/y6Uz/
http://dailypharmajobs.com/cgi-bin/CyCdO/
https://comercialadvance.com/images/MFXxM5Tg/
https://royalnight.in/wp/lEA2gXXBj/
https://gymmuscle.tk/wp-content/U8j1Bkh/
Targets
-
-
Target
572fb97b1fec24c598ccb6113fa40a3c81c1c6d0e1d01f1611920c131cbeca7c
-
Size
167KB
-
MD5
0898b0beac0d89db7a616cd49676b951
-
SHA1
ba58393c0d3dc1f9cbdfa66351254c30b126503d
-
SHA256
572fb97b1fec24c598ccb6113fa40a3c81c1c6d0e1d01f1611920c131cbeca7c
-
SHA512
6dc84807ed898aa96b9cc04d4f2bd1cbf6f211345dc3fc627111578bdee24a9a7f38eb2b5f9acab12637183546bdae1da1f3df2f6847b6949d3fe0cffc8b92bc
-
SSDEEP
3072:3/AwBB2sniZEg43bOp9AtdLaMigcOWwVW8KQlanxvlqYp+9bzbDgEarpHfR+yUJ1:zJiP/w2PZevVnL+JA8lX1h9a
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-