General
-
Target
930aa44813720d859563dae510deb7c3e72e9a92de3bb57b3b4d3b5b885ff00b
-
Size
36KB
-
Sample
230129-x2xk8acb3y
-
MD5
31c0da3948583c2435e599f94b8900c1
-
SHA1
aee1da09649da6b2124b3efc7a37cb0ece4b05b0
-
SHA256
930aa44813720d859563dae510deb7c3e72e9a92de3bb57b3b4d3b5b885ff00b
-
SHA512
ce0979707e3e320e7a86129640daae9d207758d005e15f044198c06e0a9665f260ceee0f205fff376d82570e065436aa032144471d0c14f645b3fa8c5338021c
-
SSDEEP
768:+PqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJhTbDPux7XxGIMgqf+VsY:Cok3hbdlylKsgqopeJBWhZFGkE+cL2Nz
Behavioral task
behavioral1
Sample
930aa44813720d859563dae510deb7c3e72e9a92de3bb57b3b4d3b5b885ff00b.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
930aa44813720d859563dae510deb7c3e72e9a92de3bb57b3b4d3b5b885ff00b.xls
Resource
win10v2004-20220812-en
Malware Config
Extracted
https://statedauto.com/wp-data.php
https://markens.online/wp-data.php
Targets
-
-
Target
930aa44813720d859563dae510deb7c3e72e9a92de3bb57b3b4d3b5b885ff00b
-
Size
36KB
-
MD5
31c0da3948583c2435e599f94b8900c1
-
SHA1
aee1da09649da6b2124b3efc7a37cb0ece4b05b0
-
SHA256
930aa44813720d859563dae510deb7c3e72e9a92de3bb57b3b4d3b5b885ff00b
-
SHA512
ce0979707e3e320e7a86129640daae9d207758d005e15f044198c06e0a9665f260ceee0f205fff376d82570e065436aa032144471d0c14f645b3fa8c5338021c
-
SSDEEP
768:+PqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJhTbDPux7XxGIMgqf+VsY:Cok3hbdlylKsgqopeJBWhZFGkE+cL2Nz
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation