File: b5b6b37f28dc16bbbac8df75af51f66436f7a4b4dec7ee3d911fb2601c1bb3b5

Metadata
File name:fedex-20160217-134582467925.doc
File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Wed Feb 17 09:21:00 2016, Last Saved Time/Date: Wed Feb 17 12:38:00 2016, Number of Pages: 1, Number of Words: 6, Number of Characters: 36, Security: 0
File size:186880 bytes
Analysis date:2016-02-18 08:59:55
MD5:d7f10f0195b718e1fab63cd5ad6f77aa
SHA1:099f30502894e8ceeaff2ba312f25f10083deaf1
SHA256:b5b6b37f28dc16bbbac8df75af51f66436f7a4b4dec7ee3d911fb2601c1bb3b5
SHA512:ef9c7e9b08a2e95ecd3e2f36caf0569ede19f76a20bbb4bc8930587d1a83c7ac632027a6094df89dd92689741bd816cc15339a3d16201ece99b175a6f0bc2c0e
SSDEEP:N/A
IMPHASH:N/A
Authentihash:N/A
Related resources
APTNotes
Cyber threat intelligence reports associated with b5b6b37f28dc16bbbac8df75af51f66436f7a4b4dec7ee3d911fb2601c1bb3b5.
Loading...
Domains
Domains the malware sample communicates with.
Hosts
Hosts the malware sample communicates with.
HTTP Requests
HTTP requests the malware sample makes.
AV Detections
AV detection names associated with the malware sample.
Mutants
Mutants created by the malware sample.
"\Sessions\1\BaseNamedObjects\KYIMEShareCachedData.MutexObject.PSPUBWS"
"\Sessions\1\BaseNamedObjects\KYTransactionServer.MutexObject.PSPUBWS"
"\Sessions\1\BaseNamedObjects\Local\MidiMapper_modLongMessage_RefCnt"
"\Sessions\1\BaseNamedObjects\Global\MTX_MSO_Formal1_S-1-5-21-4162757579-3804539371-4239455898-1000"
"\Sessions\1\BaseNamedObjects\Global\MTX_MSO_AdHoc1_S-1-5-21-4162757579-3804539371-4239455898-1000"
Registry keys
Registry keys created by the malware sample.
Comments
User comments about b5b6b37f28dc16bbbac8df75af51f66436f7a4b4dec7ee3d911fb2601c1bb3b5.
NOTICE: We have updated our privacy terms and conditions in accordance to GDPR. By using our site, you acknowledge that you have read and understand our Privacy Policy. Your use of ThreatMiner’s Products and Services is subject to these policies and terms.