General
-
Target
771325041cb1326e59838f219a4f4b0493d788b9e32d5404cb0f6e1c99c1408c.zip
-
Size
175KB
-
Sample
230311-tbtvvsac97
-
MD5
8643c2c613949607df0de9def50201fc
-
SHA1
c7013ce26b848563656ff94f8cfce093d95f1569
-
SHA256
de5229485b1e7728be3e9334f16dcf65f78e0c28d49f0e77230bedf4a8d4a97b
-
SHA512
8c5c095959aa07b94e39642877114654e1f9269e236c5e81b9ace75f3ead415a7d9755abaecdbeb7aa877bb66fce25d118ca29eb4f5e7e8f1fb96fd396377461
-
SSDEEP
3072:QY2+hYB9bDCR3RZvGwrLO1RVrfD5yxqHo20AWpXhWulZ7nQ8Zety:Q16c9bRbfDYKo3AgXhrla8Z6y
Behavioral task
behavioral1
Sample
771325041cb1326e59838f219a4f4b0493d788b9e32d5404cb0f6e1c99c1408c.xlsm
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
771325041cb1326e59838f219a4f4b0493d788b9e32d5404cb0f6e1c99c1408c.xlsm
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
771325041cb1326e59838f219a4f4b0493d788b9e32d5404cb0f6e1c99c1408c.xlsx
-
Size
179KB
-
MD5
b9a157c0fd8a38c5b065892987447385
-
SHA1
b4ef1891db1bd3d2d48603fea3c9dda252b75815
-
SHA256
771325041cb1326e59838f219a4f4b0493d788b9e32d5404cb0f6e1c99c1408c
-
SHA512
a6bd8f8b086be6a5aaa8b647aaf72deff3adf43ea0079706562fcfd09c5f8410034ed97169b1e4b2bb5ac503957edc7314c75eeba96f6ea489317776bd6c6fd3
-
SSDEEP
3072:Bf4t2QUL7ZHLygMa6HNKb3VzH2nIZ3IfTVR90YTH9tIaZ5UbjlUbV055n1cA:Bf5fhLvMBHNKLVWwm2m9tIoUnf5nN
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-