File: 5a7efe2953a8a73e3bdc55f463c7ecd8

Metadata
File name:k05l.docx
File type:doc
File size:50176 bytes
Analysis date:Analyzed on May 5 2017 11:59:19
MD5:5a7efe2953a8a73e3bdc55f463c7ecd8
SHA1:fe8c73a68964d7e5b34125f769a9fc0cbc30261f
SHA256:45f76e5c87e11817c1ae4189e5bb01707a73366cde2b9a576349cbb7db0e9249
SHA512:270f19c5b21c53afbe1a5d5f6b7d3e7eae80686a1a1c444bb61d445207791cb5f7ef4832695b067df26b78913da6e9eae5bad9f8cd6d92c88b1622e6f14177af
SSDEEP:N/A
IMPHASH:N/A
Authentihash:N/A
Related resources
APTNotes
Cyber threat intelligence reports associated with 5a7efe2953a8a73e3bdc55f463c7ecd8.
Loading...
Domains
Domains the malware sample communicates with.
Hosts
Hosts the malware sample communicates with.
HTTP Requests
HTTP requests the malware sample makes.
AV Detections
AV detection names associated with the malware sample.
Mutants
Mutants created by the malware sample.
"\Sessions\1\BaseNamedObjects\Global\552FFA80-3393-423d-8671-7BA046BB5906"
"Global\552FFA80-3393-423d-8671-7BA046BB5906"
"Local\ZoneAttributeCacheCounterMutex"
"Local\ZonesCounterMutex"
"Global\MsoShellExtRegAccess_S-1-5-21-4162757579-3804539371-4239455898-1000"
"Local\ZonesLockedCacheCounterMutex"
"Local\10MU_ACB10_S-1-5-5-0-59580"
"Local\10MU_ACBPIDS_S-1-5-5-0-59580"
"Local\ZonesCacheCounterMutex"
"\Sessions\1\BaseNamedObjects\Local\10MU_ACBPIDS_S-1-5-5-0-59580"
"\Sessions\1\BaseNamedObjects\Local\10MU_ACB10_S-1-5-5-0-59580"
"\Sessions\1\BaseNamedObjects\Local\ZonesCounterMutex"
"\Sessions\1\BaseNamedObjects\Local\ZoneAttributeCacheCounterMutex"
"\Sessions\1\BaseNamedObjects\Local\ZonesCacheCounterMutex"
"\Sessions\1\BaseNamedObjects\Local\ZonesLockedCacheCounterMutex"
"\Sessions\1\BaseNamedObjects\Global\MsoShellExtRegAccess_S-1-5-21-4162757579-3804539371-4239455898-1000"
Registry keys
Registry keys created by the malware sample.
Comments
User comments about 5a7efe2953a8a73e3bdc55f463c7ecd8.
NOTICE: We have updated our privacy terms and conditions in accordance to GDPR. By using our site, you acknowledge that you have read and understand our Privacy Policy. Your use of ThreatMiner’s Products and Services is subject to these policies and terms.