General
-
Target
57abba3a5175ff7eefe3e2547cc27d0ccb62282fda8443f2281dfcbe8b6b32c0
-
Size
46KB
-
Sample
240911-1n89msvckk
-
MD5
09bc237236bc1b00cb08555a8c8e7fcc
-
SHA1
6adbada8ff6967c3ff445ea39c2b4e59382a3b6a
-
SHA256
57abba3a5175ff7eefe3e2547cc27d0ccb62282fda8443f2281dfcbe8b6b32c0
-
SHA512
d86da1405e765ef1a21b9dac5b3f1d5f7f0e7d060637e27d07924e9bb215921b761200956b1a6c74b32e3e22e29d99da4a37ea5525ca7c9d5017c401dd6ed468
-
SSDEEP
768:LDMPKpb8rGYrMPe3q7Q0XV5xtezE8vpI8UM+VmQs7iqj/X20eu2p:LYKpb8rGYrMPe3q7Q0XV5xtezE8vG8U1
Behavioral task
behavioral1
Sample
57abba3a5175ff7eefe3e2547cc27d0ccb62282fda8443f2281dfcbe8b6b32c0.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
57abba3a5175ff7eefe3e2547cc27d0ccb62282fda8443f2281dfcbe8b6b32c0.xls
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://www.yedirenkajans.com/eski/y91J/
http://yahir-fz.com/joy/ZnIjgkgZ18/
http://www.wahkiulogistics.com.hk/upload/AvtsILsT00O/
Targets
-
-
Target
57abba3a5175ff7eefe3e2547cc27d0ccb62282fda8443f2281dfcbe8b6b32c0
-
Size
46KB
-
MD5
09bc237236bc1b00cb08555a8c8e7fcc
-
SHA1
6adbada8ff6967c3ff445ea39c2b4e59382a3b6a
-
SHA256
57abba3a5175ff7eefe3e2547cc27d0ccb62282fda8443f2281dfcbe8b6b32c0
-
SHA512
d86da1405e765ef1a21b9dac5b3f1d5f7f0e7d060637e27d07924e9bb215921b761200956b1a6c74b32e3e22e29d99da4a37ea5525ca7c9d5017c401dd6ed468
-
SSDEEP
768:LDMPKpb8rGYrMPe3q7Q0XV5xtezE8vpI8UM+VmQs7iqj/X20eu2p:LYKpb8rGYrMPe3q7Q0XV5xtezE8vG8U1
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-