General
-
Target
3a3c89a0440aa8dda0278f276fb57c751c9d10c68bbc96f5409126e651aa8152
-
Size
171KB
-
Sample
241120-zpzadsxpdr
-
MD5
d9c29a894206b52c9cbe72edd90182a1
-
SHA1
01e60a5d1ab06fc9fbf658925f92cd931022d059
-
SHA256
3a3c89a0440aa8dda0278f276fb57c751c9d10c68bbc96f5409126e651aa8152
-
SHA512
ee51745de3cdfa64c1eeb2d13697e715176906e09c5d4f5d4632ea839027c23bf5f24c1a1282e0b53b16fc4253d912009e6c33291fd4618ab7d411bd2b47e29e
-
SSDEEP
3072:SG4PrXcuQuvpzm4bkiaMQgAlSApJ0aP7qI0DaCppgRyLtGIhRD:8DRv1m4bnQgISCJ0aPkGIhRD
Behavioral task
behavioral1
Sample
3a3c89a0440aa8dda0278f276fb57c751c9d10c68bbc96f5409126e651aa8152.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3a3c89a0440aa8dda0278f276fb57c751c9d10c68bbc96f5409126e651aa8152.doc
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://departure.world/wp-content/V4GFFNihI/
http://songbadtv.com/wp-includes/XQrT027149/
https://planet7vip.com/czy/hR8MMWwRkY/
http://blog.tujanena.com/ariu/C2LSRbc8/
http://drsoli.com/k1vjzk/XtSsbRPzyI/
Targets
-
-
Target
3a3c89a0440aa8dda0278f276fb57c751c9d10c68bbc96f5409126e651aa8152
-
Size
171KB
-
MD5
d9c29a894206b52c9cbe72edd90182a1
-
SHA1
01e60a5d1ab06fc9fbf658925f92cd931022d059
-
SHA256
3a3c89a0440aa8dda0278f276fb57c751c9d10c68bbc96f5409126e651aa8152
-
SHA512
ee51745de3cdfa64c1eeb2d13697e715176906e09c5d4f5d4632ea839027c23bf5f24c1a1282e0b53b16fc4253d912009e6c33291fd4618ab7d411bd2b47e29e
-
SSDEEP
3072:SG4PrXcuQuvpzm4bkiaMQgAlSApJ0aP7qI0DaCppgRyLtGIhRD:8DRv1m4bnQgISCJ0aPkGIhRD
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Process spawned suspicious child process
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
-
Drops file in System32 directory
-