Overview
overview
10Static
static
1E1-2020092...00.doc
windows7-x64
10E1-2020092...00.doc
windows10-2004-x64
10E1-2020092...00.doc
windows7-x64
10E1-2020092...00.doc
windows10-2004-x64
10E1-2020092...00.doc
windows7-x64
10E1-2020092...00.doc
windows10-2004-x64
10E1-2020092...00.doc
windows7-x64
10E1-2020092...00.doc
windows10-2004-x64
10E1-2020092...00.doc
windows7-x64
10E1-2020092...00.doc
windows10-2004-x64
10E2-2020092...00.doc
windows7-x64
10E2-2020092...00.doc
windows10-2004-x64
10E2-2020092...00.doc
windows7-x64
10E2-2020092...00.doc
windows10-2004-x64
10E2-2020092...00.doc
windows7-x64
10E2-2020092...00.doc
windows10-2004-x64
10E2-2020092...00.doc
windows7-x64
10E2-2020092...00.doc
windows10-2004-x64
10E2-2020092...00.doc
windows7-x64
10E2-2020092...00.doc
windows10-2004-x64
10E3-2020092...00.doc
windows7-x64
10E3-2020092...00.doc
windows10-2004-x64
10E3-2020092...00.doc
windows7-x64
10E3-2020092...00.doc
windows10-2004-x64
10E3-2020092...00.doc
windows7-x64
10E3-2020092...00.doc
windows10-2004-x64
6E3-2020092...00.doc
windows7-x64
10E3-2020092...00.doc
windows10-2004-x64
10General
-
Target
0e78a2fb957ed535df8419efeb6836d27b504181b5ee2f37439934055638d608
-
Size
1.0MB
-
Sample
241120-nbf14swgkj
-
MD5
5791e96868c0d8b20b8b05d706c6a3d6
-
SHA1
5c137d3fc9606c11a30d64e8de9e22ddaaf68438
-
SHA256
0e78a2fb957ed535df8419efeb6836d27b504181b5ee2f37439934055638d608
-
SHA512
2f250942197e0a62a5f408dbf3b639040d62ae30f9e8e9f71772120896453af38cf9ba4615ec1c784e3b5430b2b65365ed68a7273791c0d86a613119b95f2e8a
-
SSDEEP
24576:Pz4RMDSWqDCesueeQG50ZPzfvKBcv88PPE4v:rgM2ZDBsuFv0ZDWh83Eg
Static task
static1
Behavioral task
behavioral1
Sample
E1-20200928_221400.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
E1-20200928_221400.doc
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
E1-20200929_072700.doc
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
E1-20200929_072700.doc
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
E1-20200929_123100.doc
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
E1-20200929_123100.doc
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
E1-20200929_175200.doc
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
E1-20200929_175200.doc
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
E1-20200929_222900.doc
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
E1-20200929_222900.doc
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
E2-20200929_041700.doc
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
E2-20200929_041700.doc
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
E2-20200929_090800.doc
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
E2-20200929_090800.doc
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
E2-20200929_131800.doc
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
E2-20200929_131800.doc
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
E2-20200929_175500.doc
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
E2-20200929_175500.doc
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
E2-20200929_221200.doc
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
E2-20200929_221200.doc
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
E3-20200929_082900.doc
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
E3-20200929_082900.doc
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
E3-20200929_200000.doc
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
E3-20200929_200000.doc
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
E3-20200929_222100.doc
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
E3-20200929_222100.doc
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
E3-20200929_222700.doc
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
E3-20200929_222700.doc
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://electronicsvibes.com/wp-includes/3F/
https://dubai-homes.ae/wp-admin/HX8/
http://metalurgicanunes.com.br/wp-admin/a0I/
http://greensync.com.br/aspnet_clientOld/w/
http://rydchile.cl/wp-content/rm/
http://www.sprxmy.top/wp-content/jV1/
http://microsite.buniyad.info/ynbgl/kj/
Extracted
http://www.productsofindiareviews.com/css/9Ut/
https://online24h.biz/wp-admin/n/
https://star-speed.vip/wp-admin/jp/
https://kenhthietke.com/0Fg/
https://syntegows.com/chirag/KX/
https://vishalpatola.com/wp-admin/2/
https://shmct.org/wp-admin/Xm/
Extracted
http://account-creation.tvstartup.com/wp-content/themes/yMqhmRl/
http://305.tvstartup.com/wp-content/hE2GpD/
http://khuranaeyecarecentre.com/article/GQX1/
http://esteticavaleria.com/wp-content/xmLGWWW/
http://yashdemo.yashinfosystems.com/advpanel/OVTRE/
http://eventswifiinternet.com/wp-content/E/
http://opendoorsukraine.com/media/UvBoX8A/
Extracted
https://shop.mtcss.co.uk/wp-admin/USQFPj/
https://handfinger.com/wp-includes/iCY/
http://hanulmotors.com/nbqso/8Tz/
http://helpinghands4needy.org/wp-content/LgrI9g/
http://www.ecobaratocanaria.com/wordpress/Jt/
http://macerindia.com/wp-content/hRS/
http://cfn.tvstartup.com/wp-content/7dNH1LI/
Extracted
http://techiweek.com/wp-includes/FW6/
https://ravi-tools.com/js/1/
https://providedigital.com/wp-admin/Igvi3l/
https://nghiencauca.com/wp-includes/BOInu4E/
http://jietuo66.com/hwqsv/oC/
https://oklatu.com/wp-admin/i/
https://blog.thejobstack.com/pmloibg/M/
Extracted
http://techinotebook.com/wp-includes/GTu/
http://techisquare.com/blog/zFj/
http://techinull.com/journal/euW/
https://tvinstallationofatlanta.com/wp-includes/nMZ/
https://krishnaoilindustries.com/wp-admin/545HlW/
https://www.laoyebh.com/phpMyAdmin4.8.5/QY0T/
https://shopdocauca.com/wp-includes/CKq8j/
Extracted
https://trueteeshirt.com/wp-admin/5/
https://nhaphomau.com/sa7/
https://heck-electric.com/wp-includes/vUB/
http://techinotification.com/wp-includes/ii1pd0x/
http://editzarmy.com/journal/WinEA/
https://noithatfhouse.com/wp-includes/g5JI21S/
http://techitrends.com/wp-includes/qO/
Extracted
https://youxel.com/sys-cache/lLWGgV/
https://xiaomico.com/wp-content/Rs/
http://onlynews24x7.com/5i1r62/cEsCCqC4li/
http://blog.digikhata.com/denunciar/o2/
http://test.qihchina.com/install/1b0IsII/
http://www.saffronconsulting.in/wp-content/En/
http://35.230.95.205/vxqhj/6U2gFiQPk/
Extracted
http://www.cyclodeli.com/wp-admin/m/
https://radiocristianalasvegas.com/wp-includes/wkA138w3S/
http://skaosclub.com/wp-content/bUdvlTm9D/
http://iniarsitek.com/wp-content/jkCz/
https://vlcomercio.com.br/wp-includes/oef5i/
http://www.yuryyulan.com/wp-includes/XPXi0L/
http://creativeignite.com/wp-content/fnEhE/
Extracted
https://www.sbobetmonte.com/wp-content/r5qS/
http://www.kushalbharath.com/wp-content/WsD/
http://dunion.ir/support/8USM0hcA4/
https://storypostar.com/wp-admin/N/
https://www.pixelstoryteller.com/wp-admin/kNz1g/
http://www.tianhengdaojituan.com/wp-includes/JWocY/
http://nb21.xyz/home/sIBOFci6/
Extracted
http://parlayjudibola.com/wp-includes/X/
http://freshandmorenp.com/wp-admin/images/bno7GT7Fy/
http://dinapatrika.com/wp-admin/UYV7tM4WB/
http://portal-ms.info/wp-includes/jjU55L/
https://lapapeteria.at/wp-includes/XbtywFP/
http://www.tycoonelevators.com/wp-content/T/
http://daftarsitusjudibolaterpercaya.com/wp-includes/zO/
Extracted
http://jubilantenterprise.com/wp-admin/Mj/
http://brycebrumley.com/wp-admin/lj/
http://aprendiendoganasdigital.com/wp-admin/r/
http://mymorninglove.com/wp-admin/acv/
http://shivam-aggarwal.com/cgi-bin/Zr/
https://originalsalonqatar.com/wp-admin/lS0/
http://aigtreyas.com/wp-content/p/
Extracted
http://shop.qihchina.com/validators/8/
http://skoolkam.com/blog/5ji/
http://shopmebom.webdungsan.com/wp-admin/1Oy/
http://demo77.webdungsan.com/wp-admin/6m/
https://wyyichen.com/wp-includes/W0N/
http://94.24.72.63/wp-content/te/
http://topupez.info/wp-includes/DEr/
Extracted
http://lblcomputacion.com/services/eY3/
http://shop.homenhealthy.com/wp-includes/Ltj/
http://raintoday.org/wp-admin/B/
https://qualitychildcarepreschool.com/emqblk/m/
https://www.tekadbatam.com/wp-content/Qq/
https://boke.xiaoxiekeji.top/9a654zor/JnS/
http://ys.xiaoxiekeji.top/wp-admin/uQY/
Targets
-
-
Target
E1-20200928_221400
-
Size
136KB
-
MD5
5fa2b4dd277ef21fbdbab9b7a97b4652
-
SHA1
dff5340070b7cbd47d853795f563519050aa0c13
-
SHA256
165342a5aaa39fa2d3604b42e20248d5707ac17ba7e910455a13166712313542
-
SHA512
f6be824006dbb9270e40290de2ecee31c4bbc50c661301732bddb54413240e5adba61aaff4ae72d7408dab660dc7779308d730feab00e389ca112a23ea59ca29
-
SSDEEP
3072:oDW9ZcHT9yEgaLE47f4xlP83+ushr2i/K/x0:o8ZcB7Lp4X8DYL/+x0
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-
-
-
Target
E1-20200929_072700
-
Size
149KB
-
MD5
f5b60fd7527619e96054d85e7a331517
-
SHA1
465237c15047ea094a19a8884de51151d4c5cff3
-
SHA256
950e1826d1acdd8daba1b68f52bcae990b7df66b1fa6ad09e9ce8e65a83e84bf
-
SHA512
1830d17f9c790f7bc7e1a3a1a3b44b3e26138ec3f4dd6a6f9a3ec31bd749614f14e4e630609bf4a99b91b9dc78c73879e2e4549343aafcb6be31af53acb30ed1
-
SSDEEP
1536:TJVnK90GM9xuXFEr4Zx50zkGcclJvahtqf2HXiNL0CMdfFB6Oi:TfCMbu1Ty+crStXiNBUfFB6Oi
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
-
-
Target
E1-20200929_123100
-
Size
169KB
-
MD5
d2471082d81a3ab5c53bb279561e2223
-
SHA1
3a0d4977c293ed24b954ce11b1ab2358209811d7
-
SHA256
735040fdbf1b513dfe79b4c6485de58b176dba061ef76dd8a0cb42e8161551b4
-
SHA512
e61365bc2042d9d7cd310df3fbf813483588eafe80d020d45ebeb2c6a3f89462385cd1ccd1d949ebf896a7fafc7b5e5f37d0936b0caa97dff584229a05f2d71c
-
SSDEEP
3072:R9ufstRUUKSns8T00JSHUgteMJ8qMD7gZEFESXiNBaZxPIR:R9ufsfgIf0pLiFESXiNIZxQR
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
-
-
Target
E1-20200929_175200
-
Size
102KB
-
MD5
7fad816665b2645472e0cf6d06093d5c
-
SHA1
9b8444fe1f83193a9965c5d5ec87646f5b68b972
-
SHA256
3939481b8307ac66766600073b45ebd146e9675fdb765f31f650dca3290f91fa
-
SHA512
df3ad913ec5761c0820915ed32b7a8ae3435a7456b7be1102728bab22d5892447e05aa4d0cebd144dd6db691ed7858929a9bbb02082d2fc154b8cf03d1bf763f
-
SSDEEP
768:FQ6UUXZsPTX14VTL02vTf9fH1n6PT1Ms+0/qxYKTi9TwsRT/tr3wpdQ:4CVTLNTf9f5cTB+iq/sx/FAo
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
-
-
Target
E1-20200929_222900
-
Size
144KB
-
MD5
05fc099cd700b1f5f49da7110bf675ac
-
SHA1
228b54e2e0eefb03ad833e75e744aa569e577f03
-
SHA256
08c3a51969b9ccfcd46ad14ef1a7599a798c21e693a582ac6d8f449f77f4fc09
-
SHA512
0e20f84a0326b1a1c714312072bc5757dab94dfaa2cd6b5ff9e7f60e6308268611786d677e6e2ec744ad9fe86ae4adbb34a4d7e802f5644b58c868d92526669d
-
SSDEEP
1536:hMRD3bNqfNpu39IId5a6XP3Mg8af2qf9ieW0jnzJ:CR1qf69xak3Mgx2sVjnzJ
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
-
-
Target
E2-20200929_041700
-
Size
133KB
-
MD5
9c358ef519ba4a1542b6642ef755b40e
-
SHA1
72635a3cf84a8e5b100fe16e6499efea93eb6240
-
SHA256
15d3403b8d1d07b8b635e79f0fd458c3961ef5b48d60d19b6596c9c1028a2662
-
SHA512
f749b348c6515233cfbf472e531c2f18adeaf58f2edb55e6a0bc400c8ab4dae4bdf69b80bea4b756aa98b81fa6aaf5c4342666a1c97eb4b5cdd903b5f947b71a
-
SSDEEP
1536:LA2RD3bNqfNpu39IId5a6XP3Mg8afSqCVyzwyQUpsJNw:VR1qf69xak3MgxS/EzwyQisJNw
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-
-
-
Target
E2-20200929_090800
-
Size
142KB
-
MD5
1d3df46a7f6af9269c556c5daa38481a
-
SHA1
05888c5a40ee657673c0ba668f6c8a6873e8cf1d
-
SHA256
f5013fbc3f4e685f68f19711624f55a63fc7ff5dfa0005f8c16803761c7d2788
-
SHA512
d8a9686cf81ce8c6b78594b432abd8098418b8248a007516e25ce1c45fe79f329bea702906fa1cde43ab8467ea4ae35d61a5b9b1fc7e1649393ed68e25de52dd
-
SSDEEP
1536:ALRD3bNqfNpu39IId5a6XP3Mg8afCquVoF3Cgar3Pd0MZXiNjLoob:8R1qf69xak3MgxCLoMFr3Pd0MZXiNPvb
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
-
-
Target
E2-20200929_131800
-
Size
189KB
-
MD5
1c9581bba07a6b44af152d88143df41f
-
SHA1
53b6d0e69dafc40e57e39cc38aedbee6c9c7fce2
-
SHA256
a1ff4c3cc94952016f96e7696b9d0eff572e92076bc8f88bab00ff2dc752a676
-
SHA512
ae628bfaea788e796f7daa016f53fb5d6c873590bf936be149fc914ead4148b609491d07183f58a42d579451e387d6240cf7ea5e277fe4bddc9a32fdbfc7976d
-
SSDEEP
3072:dA9ov+mLIX7wzt0HHDnwjacRHvvvvZ18gEmX:Sat0TwDR38gEmX
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
-
-
Target
E2-20200929_175500
-
Size
167KB
-
MD5
682c15e81aacde23d75af1ccd402833a
-
SHA1
afbb1e24cbebe7491474baef68275a0b9dd4168a
-
SHA256
960255acf6a199c3b1b388d617e12d03d1d2e8d8281c31263ce5afacb186f37b
-
SHA512
5efe6c81f65916151211bd7cc28a7afdc4c37e32c3063d08eabea85caf8a11346fe7e00cbc62ba356581d6fac78c384f55c6f5e3f8cbdba7dd6f0304ede080e7
-
SSDEEP
1536:lI7OxDiGmrYL7+chKas7V7tq9jD4RuqM1Ve/qkD4ksjT6T9p:674iH8Zcag7tWLy/9DHsI9p
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
-
-
Target
E2-20200929_221200
-
Size
130KB
-
MD5
f4d94fe27c343894012a3c3ff9269c14
-
SHA1
d37969e710474ef8cfac6552c42c5c8a245ea1e3
-
SHA256
a7bac9b6662da2eb4c3fa6f12c10d790ab6b8ef1735241fcd2a4d35a152a8965
-
SHA512
350b2dd5768d8184526e06b0fa4abfb1526a25010a25969b96833bb323774383812c47388d65a7a6af63e7ed29199d6d85fab698793f13357aa3a855bf01d92e
-
SSDEEP
1536:TNVLAAAAcAAAAAUmPxwMddylbvuNm9F96qpQWAfjlyqV:TLAAAAcAAAAAUSxRYs4mLlyqV
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
-
-
Target
E3-20200929_082900
-
Size
136KB
-
MD5
489b3a76f798e7edcd1a586ffa0aea72
-
SHA1
67ecbb08b776e141a5925cd7573bfcffd3aeb3d2
-
SHA256
87bbfe64cf6bdc59bfd1cbd5c157c192232ab21203ae46a94e16f0037307a83d
-
SHA512
240c67e769691193b53094eae628d7252e619448dd2bd6b69d536891cdfa60b805a7a6067e486b68471a1fbf61a1e9d99d6c10f953a267909dfc639d41a4e8ca
-
SSDEEP
1536:iSFvW9P9QuiPfRD3bNqfNpu39IId5a6XP3Mg8af2qocfFXiNqHs6KXJPHNlK:iS3R1qf69xak3Mgx2ytXiNGs6wJPHNlK
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
-
-
Target
E3-20200929_200000
-
Size
170KB
-
MD5
342e167fec542940a45d557ad0c2a957
-
SHA1
9d2010b03ebdcc0c0e619e42ee4f9e156b56e72c
-
SHA256
088d3fddb3c0dbb04979bbb194eefdf0cd9c0be2c4f5d9986c437efba2830ba0
-
SHA512
47f91199b8444e6477d1c5b75b76b1078f30bcddcac60b7c046c21a37f822fbc1d0a5ddaffa7528594367ac259d5935cc152cfe9c9578b4442d20051fe214925
-
SSDEEP
1536:i67OxDiGmrYL7+chKas7V7tq9jD4RuqM1VeNqQigvwAD/IHz:j74iH8Zcag7tWLyN9igYA7IT
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
-
-
Target
E3-20200929_222100
-
Size
150KB
-
MD5
6b3290c1a91c54cc0a16b30a533e7fe3
-
SHA1
951cb8535ed8f79e2d6e7adddb90763966498303
-
SHA256
cc309254f3cdd186551c54c300edb3ef4643447a39ab2c10fe91a33a84b45979
-
SHA512
2a445db2b08163e90e9cc0dea6d55ec765f49e4dd4a853844eb46d1ddd0f98cf9a3857cadfcd90e6801caaa8cf35c350fd3e741a93919af1efdb795ac32d6a35
-
SSDEEP
3072:+DW9ZcHT9yEgaLE47f4xlP83+lq8GtqzAR:+8ZcB7Lp4X807GoAR
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Process spawned suspicious child process
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
-
-
-
Target
E3-20200929_222700
-
Size
162KB
-
MD5
7b5ed510de3ba8db75bf56669a1c6473
-
SHA1
17356eeb60b192d4442367a6fa9c37f6d9d71c8f
-
SHA256
5010ca9fb0cb2d11acdcd32f8a6d368bb3f783a20e5290bca52d252bd814aa49
-
SHA512
db1423c28a9c4fe6726b3852dbab60bfb4dfd2574d4f38f08225c8698ae30a656c5abe53c2931402eaea667f5493f5b0443ac600af255c7f9169f1900e4082b3
-
SSDEEP
1536:I/7iQQsfDqOxqr7OxDiGmrYL7+chKas7V7tq9jD4RuqM1VetqjpsSoUlM:ImQbfrUr74iH8Zcag7tWLytypHlM
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-