General
-
Target
jfbxwvbm
-
Size
102KB
-
Sample
220404-d3mymahhg2
-
MD5
e01658f40196c8810a4b654d10212ade
-
SHA1
caed09b776174509351dfe57e87325cacee7c69d
-
SHA256
0d93a4f12d6e52dd86f8194dc522bdf7b6c4724898e929e12943c15cef4f3aa9
-
SHA512
5e502a8d00aa91155e4725323b9f7b073537565a1b185e8a8cce12259b6c7300aebabd8ef776280cecb85b451999742a5bde4ad1a460f12fec0d9c7e7158a666
Behavioral task
behavioral1
Sample
jfbxwvbm.xlsm
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
jfbxwvbm.xlsm
Resource
win10v2004-20220331-en
Malware Config
Extracted
http://singsamut.ac.th/00-----26phj/ws1iGhQ/ws1iGhQ/
Targets
-
-
Target
jfbxwvbm
-
Size
102KB
-
MD5
e01658f40196c8810a4b654d10212ade
-
SHA1
caed09b776174509351dfe57e87325cacee7c69d
-
SHA256
0d93a4f12d6e52dd86f8194dc522bdf7b6c4724898e929e12943c15cef4f3aa9
-
SHA512
5e502a8d00aa91155e4725323b9f7b073537565a1b185e8a8cce12259b6c7300aebabd8ef776280cecb85b451999742a5bde4ad1a460f12fec0d9c7e7158a666
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-