General
-
Target
562.xls
-
Size
217KB
-
Sample
221103-vqmkrscge8
-
MD5
c2e34731e0c5a3e75c35d7e6dcd5b14d
-
SHA1
9ef72765312220c818544cae93a6602e06368521
-
SHA256
885b6fbc0fc6c4047b764ecac7e7b3a30b10b203f186598ead1ad06492e94d6a
-
SHA512
118b8779c8454b4543f816beb66a545b015388801e5c11c8c8bb518022d068bfb8bb7722fb6d3d6a524c2d1fb5b30a4a1c42fe3e3504bdb2ac244879116879eb
-
SSDEEP
6144:OKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgIyY+TAQXTHGUMEyP5p6f5jQm7:bbGUMVWlb7
Behavioral task
behavioral1
Sample
562.xls
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
562.xls
Resource
win10v2004-20220812-en
Malware Config
Extracted
https://aprendeconmireia.com/images/wBu/
http://updailymail.com/cgi-bin/gBYmfqRi2utIS2n/
https://akuntansi.itny.ac.id/asset/9aVFvYeaSKOhGBSLx/
http://swiftwebbox.com/cgi-bin/vNqoMtQilpysJYRwtGu/
Targets
-
-
Target
562.xls
-
Size
217KB
-
MD5
c2e34731e0c5a3e75c35d7e6dcd5b14d
-
SHA1
9ef72765312220c818544cae93a6602e06368521
-
SHA256
885b6fbc0fc6c4047b764ecac7e7b3a30b10b203f186598ead1ad06492e94d6a
-
SHA512
118b8779c8454b4543f816beb66a545b015388801e5c11c8c8bb518022d068bfb8bb7722fb6d3d6a524c2d1fb5b30a4a1c42fe3e3504bdb2ac244879116879eb
-
SSDEEP
6144:OKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgIyY+TAQXTHGUMEyP5p6f5jQm7:bbGUMVWlb7
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Downloads MZ/PE file
-
Loads dropped DLL
-