General
-
Target
11f99b697bb830bf20b770d88acf606a.xls
-
Size
35KB
-
Sample
240101-lntfvsaeh2
-
MD5
11f99b697bb830bf20b770d88acf606a
-
SHA1
7409f574a6a46b7cfb9444a55a518aa609a3f1c7
-
SHA256
f1f89edcdf4f4556d15993a6fd3bae2062133671df1ddd2414ad5c8cfbaba33c
-
SHA512
90172f932d293240be4aaf97f0c6bc2c88a6a94b3ab04cb13ef7f0850e6b96282ee3733149194e10a728b2c5fdd53b8903be87cbb7b8c374f5bcc71e4abf1de5
-
SSDEEP
768:jPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJhVJ76KYzu7Mw:7ok3hbdlylKsgqopeJBWhZFGkE+cL2NQ
Behavioral task
behavioral1
Sample
11f99b697bb830bf20b770d88acf606a.xls
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
11f99b697bb830bf20b770d88acf606a.xls
Resource
win10v2004-20231215-en
Malware Config
Extracted
https://syracuse.best/wp-data.php
Targets
-
-
Target
11f99b697bb830bf20b770d88acf606a.xls
-
Size
35KB
-
MD5
11f99b697bb830bf20b770d88acf606a
-
SHA1
7409f574a6a46b7cfb9444a55a518aa609a3f1c7
-
SHA256
f1f89edcdf4f4556d15993a6fd3bae2062133671df1ddd2414ad5c8cfbaba33c
-
SHA512
90172f932d293240be4aaf97f0c6bc2c88a6a94b3ab04cb13ef7f0850e6b96282ee3733149194e10a728b2c5fdd53b8903be87cbb7b8c374f5bcc71e4abf1de5
-
SSDEEP
768:jPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJhVJ76KYzu7Mw:7ok3hbdlylKsgqopeJBWhZFGkE+cL2NQ
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-