General
-
Target
dcc6409e704780116523a3e6ca35edf1399b381568d26b6d0373d1d9e00be491
-
Size
46KB
-
Sample
220401-ca2qmsggej
-
MD5
969869a41c8f52fc0853eaaba007be0f
-
SHA1
7d1c58a56647a9f3ede204d60fa0e6813d1ad8d1
-
SHA256
dcc6409e704780116523a3e6ca35edf1399b381568d26b6d0373d1d9e00be491
-
SHA512
c4a1a7ff06d4b59ed39640ca213bc1640907b304b613e47b9fe3561cd7caf6acb4f0c9a0fe19c9bb79b86dcbcae51bebec1831c732396cb1294b2860bd387c86
Behavioral task
behavioral1
Sample
dcc6409e704780116523a3e6ca35edf1399b381568d26b6d0373d1d9e00be491.xlsm
Resource
win10-20220331-en
Behavioral task
behavioral2
Sample
dcc6409e704780116523a3e6ca35edf1399b381568d26b6d0373d1d9e00be491.xlsm
Resource
win10-20220331-en
Malware Config
Extracted
http://eles-tech.com/css/KzMysMqFMs/
http://gonorthhalifax.com/wp-content/yTmYyLbTKZV2czsUO/
https://txpcrescue.com/cgi-bin/5tSO8/
http://hadramout21.com/jetpack-temp/Py/
http://haribuilders.com/zoombox-master/4HYGX/
http://hansen-arnal.com/cp/iiTrAeEtvOwmjjekWgI/
Extracted
http://eles-tech.com/css/KzMysMqFMs/
Targets
-
-
Target
dcc6409e704780116523a3e6ca35edf1399b381568d26b6d0373d1d9e00be491
-
Size
46KB
-
MD5
969869a41c8f52fc0853eaaba007be0f
-
SHA1
7d1c58a56647a9f3ede204d60fa0e6813d1ad8d1
-
SHA256
dcc6409e704780116523a3e6ca35edf1399b381568d26b6d0373d1d9e00be491
-
SHA512
c4a1a7ff06d4b59ed39640ca213bc1640907b304b613e47b9fe3561cd7caf6acb4f0c9a0fe19c9bb79b86dcbcae51bebec1831c732396cb1294b2860bd387c86
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Drops file in System32 directory
-