General
-
Target
7a8f2f01546cd9f1fb2b6cb60c8f8c314f4029bbe107102b3bef7cc44108682a.xls
-
Size
217KB
-
Sample
221104-e4cdysdchq
-
MD5
8440a82bb0cdc804679970d13505388f
-
SHA1
744fc98189e41e3fed0cbc303968e4d52a08d0af
-
SHA256
7a8f2f01546cd9f1fb2b6cb60c8f8c314f4029bbe107102b3bef7cc44108682a
-
SHA512
277ccb07d0963653fd3c407c2fd2709a17598d27e7ab6e4838ae1173cbe9e85158d4359957007e8f5b4567edd3cf4e5e2bb17159ec16c2121a7c91cf9809665d
-
SSDEEP
6144:zKpb8rGYrMPe3q7Q0XV5xtuEsi8/dglyY+TAQXTHGUMEyP5p6f5jQms:JbGUMVWlbs
Behavioral task
behavioral1
Sample
7a8f2f01546cd9f1fb2b6cb60c8f8c314f4029bbe107102b3bef7cc44108682a.xls
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
7a8f2f01546cd9f1fb2b6cb60c8f8c314f4029bbe107102b3bef7cc44108682a.xls
Resource
win10-20220812-en
Malware Config
Extracted
http://aquariorecords.com.br/wp-content/A8G3ownNApEj1L4hF/
http://ftp.pricoat.com.mx/Fichas/3ybJLLXu5zqqn8Sx/
http://armannahalpersian.ir/3H5qqUOB/
http://alagi.ge/application/irnz5Rs8qWvQrf/
Targets
-
-
Target
7a8f2f01546cd9f1fb2b6cb60c8f8c314f4029bbe107102b3bef7cc44108682a.xls
-
Size
217KB
-
MD5
8440a82bb0cdc804679970d13505388f
-
SHA1
744fc98189e41e3fed0cbc303968e4d52a08d0af
-
SHA256
7a8f2f01546cd9f1fb2b6cb60c8f8c314f4029bbe107102b3bef7cc44108682a
-
SHA512
277ccb07d0963653fd3c407c2fd2709a17598d27e7ab6e4838ae1173cbe9e85158d4359957007e8f5b4567edd3cf4e5e2bb17159ec16c2121a7c91cf9809665d
-
SSDEEP
6144:zKpb8rGYrMPe3q7Q0XV5xtuEsi8/dglyY+TAQXTHGUMEyP5p6f5jQms:JbGUMVWlbs
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-