General
-
Target
ENTIRE_MESSAGE.eml
-
Size
1.7MB
-
Sample
230815-r6yfesdb2v
-
MD5
40dd6131c64066450102cde1f266188f
-
SHA1
2f907fda32782e3617d515c7af584f67b1516082
-
SHA256
f88dfa42962178a8ae6c28ca80ea8aea32c37896075937e7180b0257dda55c05
-
SHA512
caefbccde12e588516f50e6e1c30c166753671a125806bf6e5600c08b852f4c0d240848f91d1418f0879782645845570a8ea6415c861282922d88bc887874bfb
-
SSDEEP
24576:FnUuSN7RqRBiPM2yzIpF+/rNPM3TAqTeU6+bxeJQSVATNkkPwe5q8CsQ:3Icn0E82
Static task
static1
Behavioral task
behavioral1
Sample
specifikációk.xls
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
specifikációk.xls
Resource
win10v2004-20230703-en
Malware Config
Targets
-
-
Target
specifikációk.xls
-
Size
1.3MB
-
MD5
dd80924ef01d631fffb4eff4311863d4
-
SHA1
834921ed2647cde9d783f073f4208b692489d27b
-
SHA256
38f7c5656140ebaed0b9ba69f1696576fff3d9ce5a87f77f1b2096277a4a0df6
-
SHA512
223420a13c13634f7111a273ae294bbbed9e9db5e0a6f21e41d72f6e2771f055cc9c389deff1fef9a8d88b112ed4e52228958ee32eca73cda29a0f6e718001bf
-
SSDEEP
24576:qaZy0w6VgjKaWlEzp7a0Zyaw6VejKaWlEzp7akzdXwyb7QAFQp5E/Qwrx:qE86VgjKjOzJy6VejKjOzDdB7/FX/QA
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-