General
-
Target
Documents_2107120546.xls
-
Size
273KB
-
Sample
210312-hztk9z9xv6
-
MD5
ab63a0153a6fe4e139ad83a6ffbab090
-
SHA1
1995e0863944a36b315a04b3ad7d073d50e16d05
-
SHA256
3e43ec6538c8a8e0e3eee05ddfe1f304e9d42c9647c7df186c61c5e2d3c6218d
-
SHA512
b2bd1ed261d87760265f82304f6feb4981d994217350325bb3e8715355f8acdeb782936861b18513544f8873ee344699670415d3e74798fa18ac256dad200a78
Behavioral task
behavioral1
Sample
Documents_2107120546.xls
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Documents_2107120546.xls
Resource
win10v20201028
Malware Config
Extracted
https://sssolutionsllc.org/k.php
Extracted
zloader
kev
12/03
https://dazzlingnight.com/post.php
https://rylaconfxilo.tk/post.php
https://seaofsilver.com/post.php
https://kenthehafana.tk/post.php
Targets
-
-
Target
Documents_2107120546.xls
-
Size
273KB
-
MD5
ab63a0153a6fe4e139ad83a6ffbab090
-
SHA1
1995e0863944a36b315a04b3ad7d073d50e16d05
-
SHA256
3e43ec6538c8a8e0e3eee05ddfe1f304e9d42c9647c7df186c61c5e2d3c6218d
-
SHA512
b2bd1ed261d87760265f82304f6feb4981d994217350325bb3e8715355f8acdeb782936861b18513544f8873ee344699670415d3e74798fa18ac256dad200a78
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-