General
-
Target
d8fc61bfe14ab2d7d258d1607e66b4fb5a6a0c6739f444aa3410929f7f36cba4xls.xls
-
Size
754KB
-
Sample
231207-yclm4afa22
-
MD5
8bc3fe969421bddf67f1f915df3780ad
-
SHA1
337501b622b92528ebcbb80e313b8c34bbdd3fa7
-
SHA256
d8fc61bfe14ab2d7d258d1607e66b4fb5a6a0c6739f444aa3410929f7f36cba4
-
SHA512
24dbd3e01df85055e5a7ab6ac1b54cf2f993af2d00683afed8f085642aefd232fdfc2e632b35b69a6b0071712135959b10efb848e20d3adc2fa61116c76604aa
-
SSDEEP
12288:aoPIj/NtKmSvwtfNsHv38KHa1eYNqscnYwclMZWeVQOgiHviwa4cekHW:PIT6uNsHv3shPcnY5uZN++HKwnAW
Behavioral task
behavioral1
Sample
d8fc61bfe14ab2d7d258d1607e66b4fb5a6a0c6739f444aa3410929f7f36cba4xls.xls
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
d8fc61bfe14ab2d7d258d1607e66b4fb5a6a0c6739f444aa3410929f7f36cba4xls.xls
Resource
win10v2004-20231127-en
Malware Config
Targets
-
-
Target
d8fc61bfe14ab2d7d258d1607e66b4fb5a6a0c6739f444aa3410929f7f36cba4xls.xls
-
Size
754KB
-
MD5
8bc3fe969421bddf67f1f915df3780ad
-
SHA1
337501b622b92528ebcbb80e313b8c34bbdd3fa7
-
SHA256
d8fc61bfe14ab2d7d258d1607e66b4fb5a6a0c6739f444aa3410929f7f36cba4
-
SHA512
24dbd3e01df85055e5a7ab6ac1b54cf2f993af2d00683afed8f085642aefd232fdfc2e632b35b69a6b0071712135959b10efb848e20d3adc2fa61116c76604aa
-
SSDEEP
12288:aoPIj/NtKmSvwtfNsHv38KHa1eYNqscnYwclMZWeVQOgiHviwa4cekHW:PIT6uNsHv3shPcnY5uZN++HKwnAW
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-