General
-
Target
aafb383aa037a43175e0f54162dcd03405ec541a150e6752d7193995ef9071cc
-
Size
64KB
-
Sample
220117-1yc9ysdaa5
-
MD5
9c04ae80f6d403f686236383673c96e5
-
SHA1
aa036250ec5886e05c0bc63df44a72ffedd9f056
-
SHA256
aafb383aa037a43175e0f54162dcd03405ec541a150e6752d7193995ef9071cc
-
SHA512
256b0da900c5145927c0ea3de95b97fa19d0478a0618b14a5c0fc06fe55d708d0ee796aa69686ad1b0446f145b81783c36859573003d257b462d5419016b13a6
Behavioral task
behavioral1
Sample
aafb383aa037a43175e0f54162dcd03405ec541a150e6752d7193995ef9071cc.xls
Resource
win10-en-20211208
Behavioral task
behavioral2
Sample
aafb383aa037a43175e0f54162dcd03405ec541a150e6752d7193995ef9071cc.xls
Resource
win10-en-20211208
Malware Config
Extracted
http://0xc12a24f5/cc.html
Targets
-
-
Target
aafb383aa037a43175e0f54162dcd03405ec541a150e6752d7193995ef9071cc
-
Size
64KB
-
MD5
9c04ae80f6d403f686236383673c96e5
-
SHA1
aa036250ec5886e05c0bc63df44a72ffedd9f056
-
SHA256
aafb383aa037a43175e0f54162dcd03405ec541a150e6752d7193995ef9071cc
-
SHA512
256b0da900c5145927c0ea3de95b97fa19d0478a0618b14a5c0fc06fe55d708d0ee796aa69686ad1b0446f145b81783c36859573003d257b462d5419016b13a6
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-