General
-
Target
emo99.xls
-
Size
142KB
-
Sample
220204-qlm9aaadfp
-
MD5
151a3a0128124613ed535a0c94fef154
-
SHA1
202916a33701b5db729211b462a6abb94f98c1fa
-
SHA256
8ddd5a2055cae9fa9e49ac6f4827d99d40d0ca74e880f521bc33079fb0d9405c
-
SHA512
0732461d273e576a817cd220f1e0e1830e9bf02434142a66fb7093ca9bf29f35123db59e571aad7e3d49bec67d021300955849c6224b57e958dc97f6dcf34335
Static task
static1
Behavioral task
behavioral1
Sample
emo99.xls
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
emo99.xls
Resource
win10v2004-en-20220112
Malware Config
Extracted
http://goyaluat.vmesh.in/0v6kcny/CG/
https://mars.srl/wp-admin/7Ffk6LLN2Xs2W/
http://franmulero.es/mbx/8c5RBJx6/
http://varafood.com/Ajax/cnM91G/
https://7jcat.com/wp-content/t/
http://blog.centralhome.hu/wp-content/pB1RfPCnBlS1WfpcOL/
http://zimrights.co.zw/oldsite/k0EoCWycU9tNo1d/
https://mudhands.com/error/BfH/
http://albatrospatagonia.com/phkcvt/t53ceSMDqgPQlq/
http://mapcommunications.co.zw/wp-admin/mdRRbSdU3aB7Xpx6z/
http://odconsult.co.uk/ALFA_DATA/HHr0FqOXAn62/
http://dushkin.net/img/bhQSTNicEMtNQxP/
Targets
-
-
Target
emo99.xls
-
Size
142KB
-
MD5
151a3a0128124613ed535a0c94fef154
-
SHA1
202916a33701b5db729211b462a6abb94f98c1fa
-
SHA256
8ddd5a2055cae9fa9e49ac6f4827d99d40d0ca74e880f521bc33079fb0d9405c
-
SHA512
0732461d273e576a817cd220f1e0e1830e9bf02434142a66fb7093ca9bf29f35123db59e571aad7e3d49bec67d021300955849c6224b57e958dc97f6dcf34335
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Sets service image path in registry
-