General
-
Target
6d8c18225d54e57ba8a925aca68fbed403131cd3e2252c89702285cc2a2a1b7d
-
Size
171KB
-
Sample
241120-ph549awqhx
-
MD5
a2891a0b5e1936d975b0bec7d04f44a9
-
SHA1
b57bc9e3f1f29223d9a52a01707c4ce2e1eea852
-
SHA256
6d8c18225d54e57ba8a925aca68fbed403131cd3e2252c89702285cc2a2a1b7d
-
SHA512
8b4e352e9017e5d352b2d6282edfb431f758e61f2b732c2e175f97b11462ae4dda74957c3ca1865847133785db1f32dfc184af14edd244e53db24c18860ffecc
-
SSDEEP
3072:+4PrXcuQuvpzm4bkiaMQgAlSCPoAnMC4EGilWOTw00rRX:3DRv1m4bnQgISCPo69w00rRX
Behavioral task
behavioral1
Sample
6d8c18225d54e57ba8a925aca68fbed403131cd3e2252c89702285cc2a2a1b7d.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6d8c18225d54e57ba8a925aca68fbed403131cd3e2252c89702285cc2a2a1b7d.doc
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://chestersvideobar.com/blogs/w0x0lEZ/
http://paula.strategicwebmarketingmd.com/wp-admin/rdi3505/
https://bucksngems.com/bucksn0/r96270/
http://xiaodaji.com/wp-includes/ID3/DeQFPrxR/
http://www.coworkanytime.com/wp-content/uploads/DZIizOT/
Targets
-
-
Target
6d8c18225d54e57ba8a925aca68fbed403131cd3e2252c89702285cc2a2a1b7d
-
Size
171KB
-
MD5
a2891a0b5e1936d975b0bec7d04f44a9
-
SHA1
b57bc9e3f1f29223d9a52a01707c4ce2e1eea852
-
SHA256
6d8c18225d54e57ba8a925aca68fbed403131cd3e2252c89702285cc2a2a1b7d
-
SHA512
8b4e352e9017e5d352b2d6282edfb431f758e61f2b732c2e175f97b11462ae4dda74957c3ca1865847133785db1f32dfc184af14edd244e53db24c18860ffecc
-
SSDEEP
3072:+4PrXcuQuvpzm4bkiaMQgAlSCPoAnMC4EGilWOTw00rRX:3DRv1m4bnQgISCPo69w00rRX
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-