General
-
Target
7f5d3acaab8a12f04d21e4c6f76511c5631c9bb780ef698c1766c45bb4debbfb.xls
-
Size
217KB
-
Sample
221104-cwccwaabh2
-
MD5
b0739f1f1dfa9d3c4c63b44fe87671fe
-
SHA1
5ae6c0edf375e16f14b74aad299e3e3023d55c3d
-
SHA256
7f5d3acaab8a12f04d21e4c6f76511c5631c9bb780ef698c1766c45bb4debbfb
-
SHA512
5efd6a5416b013f8a88f3142caffde5a1792ef22fb10d0b0f8e414c3febbaa21727ba7bdf434958105fe78f8f68aca285dd8d91f3bf719cb47ecaaef09acce1a
-
SSDEEP
6144:zKpb8rGYrMPe3q7Q0XV5xtuEsi8/dglyY+TAQXTHGUMEyP5p6f5jQmc:JbGUMVWlbc
Behavioral task
behavioral1
Sample
7f5d3acaab8a12f04d21e4c6f76511c5631c9bb780ef698c1766c45bb4debbfb.xls
Resource
win10-20220901-en
Behavioral task
behavioral2
Sample
7f5d3acaab8a12f04d21e4c6f76511c5631c9bb780ef698c1766c45bb4debbfb.xls
Resource
win10-20220812-en
Malware Config
Extracted
http://aquariorecords.com.br/wp-content/A8G3ownNApEj1L4hF/
http://ftp.pricoat.com.mx/Fichas/3ybJLLXu5zqqn8Sx/
http://armannahalpersian.ir/3H5qqUOB/
http://alagi.ge/application/irnz5Rs8qWvQrf/
Targets
-
-
Target
7f5d3acaab8a12f04d21e4c6f76511c5631c9bb780ef698c1766c45bb4debbfb.xls
-
Size
217KB
-
MD5
b0739f1f1dfa9d3c4c63b44fe87671fe
-
SHA1
5ae6c0edf375e16f14b74aad299e3e3023d55c3d
-
SHA256
7f5d3acaab8a12f04d21e4c6f76511c5631c9bb780ef698c1766c45bb4debbfb
-
SHA512
5efd6a5416b013f8a88f3142caffde5a1792ef22fb10d0b0f8e414c3febbaa21727ba7bdf434958105fe78f8f68aca285dd8d91f3bf719cb47ecaaef09acce1a
-
SSDEEP
6144:zKpb8rGYrMPe3q7Q0XV5xtuEsi8/dglyY+TAQXTHGUMEyP5p6f5jQmc:JbGUMVWlbc
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-