General
-
Target
Unconfirmed Invoices - total amount.xll
-
Size
311KB
-
Sample
230922-s4l52sah67
-
MD5
0af697996cb345dee132ffefd95ea3f2
-
SHA1
8399512fb4cdf461dabd84a2117036d9c6795e20
-
SHA256
a3ddfc31a26aaa082f0b6fedde5a6e4cb4b53cfc31ce077556369e6efd185482
-
SHA512
b7d111a7622489affd7cc843756eb981771fa5ba958f54a8b3e7e09541679f1b0e666ffef6e03b8282b56768436b9cc20ee1bbf24ee23caa407a9b7736e08314
-
SSDEEP
6144:xx2XvK1mczNyVisH40EyZVS9g8/9XdIwdP34uAnwMGEH8Vvf+EhgDPoQg:yXvgNVqiyZ+gY920ouAwtpGvwQg
Static task
static1
Behavioral task
behavioral1
Sample
Device/HarddiskVolume4/Users/Admin/Downloads/016468b087cdbe5123189b68965cb65dc95ba1a59fc3ed32144b92d.xll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Device/HarddiskVolume4/Users/Admin/Downloads/016468b087cdbe5123189b68965cb65dc95ba1a59fc3ed32144b92d.xll
Resource
win10v2004-20230915-en
Malware Config
Extracted
Targets
-
-
Target
Device/HarddiskVolume4/Users/Admin/Downloads/016468b087cdbe5123189b68965cb65dc95ba1a59fc3ed32144b92d1274d13b6/016468b087cdbe5123189b68965cb65dc95ba1a59fc3ed32144b92d1274d13b6/Unconfirmed Invoices - total amount.xll
-
Size
573KB
-
MD5
76a7d4c43cbe51e7cac8e6eb88d1a9b7
-
SHA1
3186fceaea15217c4345cab35fc71087feeba204
-
SHA256
ef74d2b8d1767667fb6817916f7d2d2c998358e07422a6af246151e0299f26aa
-
SHA512
424257365fdea3138e9e61503bce99c1949680ed4a24b7e55a1dd08e721c12fee16da9b4f5575e4b2c42270c7911b875f8c6a3c2d3ee14b75c3e24bc74277ffe
-
SSDEEP
12288:an/zDvGHAykHSzLW/4+8bzbBSreMd5LFgFK/UqW:IzbGHAzHAjX1EcL
Score10/10-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Loads dropped DLL
-