General
-
Target
0b0ff167a2abc391dff0d8277e2a22d32761a19950d161a9a7e6883df152b6c1.xlsx
-
Size
218KB
-
Sample
230211-ctl5asdd51
-
MD5
c0142b09ee6bdeded8a78e1118ad1b24
-
SHA1
3c5f6dddade6670758f2b2b9bfa55aafeb0d86c3
-
SHA256
0b0ff167a2abc391dff0d8277e2a22d32761a19950d161a9a7e6883df152b6c1
-
SHA512
4ec2993608eedc5f2e5fd3c9e9c2739b0d8be36134b6a92ef9d864238df2e561eb62be2460e4ba7072cdf9aa1a7a8b0e094d13c03b9d5fe004af3ef2a6a2b183
-
SSDEEP
6144:ik3hOdsylKlgxopeiBNhZF+E+W2kdAzyY+TAQXTHGUMEyP5p6f5jQmnf:HbGUMVWlbnf
Behavioral task
behavioral1
Sample
0b0ff167a2abc391dff0d8277e2a22d32761a19950d161a9a7e6883df152b6c1.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0b0ff167a2abc391dff0d8277e2a22d32761a19950d161a9a7e6883df152b6c1.xls
Resource
win10v2004-20220812-en
Malware Config
Extracted
http://ftp.agir-santeinternationale.com/doctors/KAacngW97n4ApzVBDdGy/
http://www.vinyz.com/admin3693/BDFFgAZ6zBRumcUSG/
http://ly.yjlianyi.top/wp-admin/NRAdJ/
http://www.muyehuayi.com/cmp/Vtm2m7z88g/
Targets
-
-
Target
0b0ff167a2abc391dff0d8277e2a22d32761a19950d161a9a7e6883df152b6c1.xlsx
-
Size
218KB
-
MD5
c0142b09ee6bdeded8a78e1118ad1b24
-
SHA1
3c5f6dddade6670758f2b2b9bfa55aafeb0d86c3
-
SHA256
0b0ff167a2abc391dff0d8277e2a22d32761a19950d161a9a7e6883df152b6c1
-
SHA512
4ec2993608eedc5f2e5fd3c9e9c2739b0d8be36134b6a92ef9d864238df2e561eb62be2460e4ba7072cdf9aa1a7a8b0e094d13c03b9d5fe004af3ef2a6a2b183
-
SSDEEP
6144:ik3hOdsylKlgxopeiBNhZF+E+W2kdAzyY+TAQXTHGUMEyP5p6f5jQmnf:HbGUMVWlbnf
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-