General
-
Target
3f1e3be90faad6ec87e3c7db24ed061fad4d2548f747b8e68a7f15c26d10a58b
-
Size
68KB
-
Sample
240801-z42daswfrk
-
MD5
97db240cfb4fde1ed5afef0680b9bd77
-
SHA1
fa58fbbbc902082a64af59ea5d693caed7eddaff
-
SHA256
3f1e3be90faad6ec87e3c7db24ed061fad4d2548f747b8e68a7f15c26d10a58b
-
SHA512
c9e0179f956e8c10e12f1ed9eddd324308b5c2ecab31bcb59b1a1787ddfe90bd339140ad1f394363e44cfcad7c6141071f35d2870231fcec63ceedfe5cab5682
-
SSDEEP
1536:f9hWk3hbd9382I6/4vw+Wtu5CEUEmfgPfQ6r0DnUD/PkkSgn84lH4wpvZjkkU3J+:f9hWk3hbd9382I6/4vw+Wtu5CEUEmfgH
Behavioral task
behavioral1
Sample
3f1e3be90faad6ec87e3c7db24ed061fad4d2548f747b8e68a7f15c26d10a58b.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3f1e3be90faad6ec87e3c7db24ed061fad4d2548f747b8e68a7f15c26d10a58b.xls
Resource
win10v2004-20240730-en
Malware Config
Extracted
https://tmpfiles.org/dl/10333590/exploit.jpg
Targets
-
-
Target
3f1e3be90faad6ec87e3c7db24ed061fad4d2548f747b8e68a7f15c26d10a58b
-
Size
68KB
-
MD5
97db240cfb4fde1ed5afef0680b9bd77
-
SHA1
fa58fbbbc902082a64af59ea5d693caed7eddaff
-
SHA256
3f1e3be90faad6ec87e3c7db24ed061fad4d2548f747b8e68a7f15c26d10a58b
-
SHA512
c9e0179f956e8c10e12f1ed9eddd324308b5c2ecab31bcb59b1a1787ddfe90bd339140ad1f394363e44cfcad7c6141071f35d2870231fcec63ceedfe5cab5682
-
SSDEEP
1536:f9hWk3hbd9382I6/4vw+Wtu5CEUEmfgPfQ6r0DnUD/PkkSgn84lH4wpvZjkkU3J+:f9hWk3hbd9382I6/4vw+Wtu5CEUEmfgH
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Office macro that triggers on suspicious action
Office document macro which triggers in special circumstances - often malicious.
-
Deletes itself
-