General
-
Target
3151eeb337bdc0be093f392e879cb8eaf3a44d10d012f3296cd029a35d763d45
-
Size
216KB
-
Sample
231114-a5mh4aff7s
-
MD5
77e79041cb0e54f0a870d34e27c7aa86
-
SHA1
96c930902306610fef6861644df8e2223812c558
-
SHA256
3151eeb337bdc0be093f392e879cb8eaf3a44d10d012f3296cd029a35d763d45
-
SHA512
ba93f98bdcd2b19be7026c4be2baccb2ceca94e77f2382310f133d3cf027c2063f43047d46bbdf8413f14bd149fc8d345ab42b234a8bed6815ee806349f369d2
-
SSDEEP
6144:7Tett7tHOJ+QLdFPaqFKeyRYY9Ijk345s/n+fh:3gpJ4PaqF3Y9IjkI4e
Static task
static1
Behavioral task
behavioral1
Sample
HYUNDAI INVITATION LETTER.xls
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
HYUNDAI INVITATION LETTER.xls
Resource
win10v2004-20231020-en
Malware Config
Extracted
https://uploaddeimagens.com.br/images/004/654/536/original/new_image.jpg?1698957750
https://uploaddeimagens.com.br/images/004/654/536/original/new_image.jpg?1698957750
Targets
-
-
Target
HYUNDAI INVITATION LETTER.xla
-
Size
282KB
-
MD5
8ebd7658975d158beeb4587ac66d2628
-
SHA1
b83a388737ab385163ef9ddb715a45d04550f138
-
SHA256
1f9447b936dfc7d9b4ed44796367ade3baa9dec8776e18154b3e45b4cb08bebc
-
SHA512
99fa927495f1604b4a876f85953ff6d5718096705481c5fce7dedc5cffbb5f62b7f5a7228339522876ae34aa3539753b48bf250c2ca6b3e02abe65b321d22ecc
-
SSDEEP
6144:EXRC/eu3YDp7LLFY35qAOJl/YrLYz+WrNhZF+E+fgL+0dD8ivSbVsnMI0zBRBmSg:EX4mw3bVsnMIOfm
Score10/10-
Blocklisted process makes network request
-
Abuses OpenXML format to download file from external location
-
Drops file in System32 directory
-