General
-
Target
quakbot_modified.xls
-
Size
233KB
-
Sample
230301-1kcfhahh3y
-
MD5
ce044d6bb758a9828ebcf4edeb4b1673
-
SHA1
1ac9e749d2d7cefa25be6414848dbc6bc4a45924
-
SHA256
20d33b79e5c5fceee471966035b5d60d8b09e62b8024c34688c864c576d271ff
-
SHA512
133b1be9d1507728580d10324ab4d743345ab97a7951a3e21f52f5e68e13680ba1e3a34b3d1060f199b3015db45da91e73b83eee68874cc59b14f2a9352ae1e5
-
SSDEEP
3072:hTzlaz6kqB/EsWcXCJGbtyntvHGiYMnIOwKSIYFUQRLmTDBwszHbcOQafZDT9e:hzb5nRXCw+DnIdFUKmTDBwsz7c1yDI
Behavioral task
behavioral1
Sample
quakbot_modified.xlsb
Resource
win10v2004-20230220-en
Malware Config
Extracted
http://insomnihack.ch
http:
Targets
-
-
Target
quakbot_modified.xls
-
Size
233KB
-
MD5
ce044d6bb758a9828ebcf4edeb4b1673
-
SHA1
1ac9e749d2d7cefa25be6414848dbc6bc4a45924
-
SHA256
20d33b79e5c5fceee471966035b5d60d8b09e62b8024c34688c864c576d271ff
-
SHA512
133b1be9d1507728580d10324ab4d743345ab97a7951a3e21f52f5e68e13680ba1e3a34b3d1060f199b3015db45da91e73b83eee68874cc59b14f2a9352ae1e5
-
SSDEEP
3072:hTzlaz6kqB/EsWcXCJGbtyntvHGiYMnIOwKSIYFUQRLmTDBwszHbcOQafZDT9e:hzb5nRXCw+DnIdFUKmTDBwsz7c1yDI
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-