General
-
Target
RomaniaRequestImunSRL092023_JC.xls
-
Size
100KB
-
Sample
230918-wzbejaea23
-
MD5
d8c96466da14e352c8a11c86a61200fa
-
SHA1
738380f30ec9f2448875dd97759bf49aa292cf46
-
SHA256
896dd0f8a116edbf4f54be7fac310410467043ecbd86b2d4d66089f14bde6d01
-
SHA512
d81aafbea2392976e331e00ca0cd5c4054f7aab57a640af8a15c6143846c828c0235f34a94721313dec400a8b0724111ed647865846971d33ccca7a57bf5f70c
-
SSDEEP
3072:0rxEtjPOtioVjDGUU1qfDlaGGx+cL2QnA9tJE2zuxq+fr9wBLa71ba2ryLTHeY+:axEtjPOtioVjDGUU1qfDlavx+W2QnAnF
Behavioral task
behavioral1
Sample
RomaniaRequestImunSRL092023_JC.xls
Resource
win7-20230831-en
Malware Config
Extracted
bitrat
1.38
185.225.75.68:3569
-
communication_password
0edcbe7d888380c49e7d1dcf67b6ea6e
-
tor_process
tor
Targets
-
-
Target
RomaniaRequestImunSRL092023_JC.xls
-
Size
100KB
-
MD5
d8c96466da14e352c8a11c86a61200fa
-
SHA1
738380f30ec9f2448875dd97759bf49aa292cf46
-
SHA256
896dd0f8a116edbf4f54be7fac310410467043ecbd86b2d4d66089f14bde6d01
-
SHA512
d81aafbea2392976e331e00ca0cd5c4054f7aab57a640af8a15c6143846c828c0235f34a94721313dec400a8b0724111ed647865846971d33ccca7a57bf5f70c
-
SSDEEP
3072:0rxEtjPOtioVjDGUU1qfDlaGGx+cL2QnA9tJE2zuxq+fr9wBLa71ba2ryLTHeY+:axEtjPOtioVjDGUU1qfDlavx+W2QnAnF
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-