General
-
Target
Zapitvane_MACH_BULGARIA_EOOD_09_2023.xls
-
Size
100KB
-
Sample
230919-te2pwacc43
-
MD5
55e0c24ad93d53e9a161d813f09d9e9a
-
SHA1
e3b6b703b99801b32a4c9754d591383dc30432bb
-
SHA256
c1f218a24f82946584e59d64abc9762e85614803fe82c432d21678d1ae000db5
-
SHA512
55127c6cbb0a7120f86378feb4057ccfc5341b22f902fffd14121cde404002de6422ebc5b346ae8ea8967d458d4581c68f7ae97d6b0ff85ad10d38aa38071375
-
SSDEEP
3072:QrxEtjPOtioVjDGUU1qfDlaGGx+cL2QnADtJE2zuxq+fr9wBLa71ba2ryLTHeYR:2xEtjPOtioVjDGUU1qfDlavx+W2QnApF
Behavioral task
behavioral1
Sample
Zapitvane_MACH_BULGARIA_EOOD_09_2023.xls
Resource
win7-20230831-en
Malware Config
Extracted
bitrat
1.38
185.225.75.68:3569
-
communication_password
0edcbe7d888380c49e7d1dcf67b6ea6e
-
tor_process
tor
Targets
-
-
Target
Zapitvane_MACH_BULGARIA_EOOD_09_2023.xls
-
Size
100KB
-
MD5
55e0c24ad93d53e9a161d813f09d9e9a
-
SHA1
e3b6b703b99801b32a4c9754d591383dc30432bb
-
SHA256
c1f218a24f82946584e59d64abc9762e85614803fe82c432d21678d1ae000db5
-
SHA512
55127c6cbb0a7120f86378feb4057ccfc5341b22f902fffd14121cde404002de6422ebc5b346ae8ea8967d458d4581c68f7ae97d6b0ff85ad10d38aa38071375
-
SSDEEP
3072:QrxEtjPOtioVjDGUU1qfDlaGGx+cL2QnADtJE2zuxq+fr9wBLa71ba2ryLTHeYR:2xEtjPOtioVjDGUU1qfDlavx+W2QnApF
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-