General
-
Target
e7b0128fdc780e228be72adbed8765c4.bin
-
Size
758KB
-
Sample
241027-b61b1ssape
-
MD5
9cdf8ea25331dbacf563d59f3fb2a614
-
SHA1
631153a60440613f0e893be57611b39e1af77602
-
SHA256
0b054ce9d37f0897d0a40b6485d6629baea938dcf9179e290b1808357df5297a
-
SHA512
09675946dcaa7d9fca23077ac04a63ddf6fc399780d80a9e3cf4deab080c4c4b177dfc721bc4c75baf8c53bbd38001e893df327bd1a9ae4fac245c32bea9df46
-
SSDEEP
12288:gbkuhdT3H+DkbYplYLGtwJHTDUeG3z6oM3DVLZig/OCGisJTD/wf8r1Cd6fmtAg0:qXbYpttw0ezogJVdcv3E0mWr8SRKIFT
Static task
static1
Behavioral task
behavioral1
Sample
c03299410145508191967d0544203e1aed4fc9886b7b11d6d4f05500d002a786.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c03299410145508191967d0544203e1aed4fc9886b7b11d6d4f05500d002a786.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
Targets
-
-
Target
c03299410145508191967d0544203e1aed4fc9886b7b11d6d4f05500d002a786.xls
-
Size
1.0MB
-
MD5
e7b0128fdc780e228be72adbed8765c4
-
SHA1
4a7456b2d6422c33f8f7aafa302cd43c8d2d5033
-
SHA256
c03299410145508191967d0544203e1aed4fc9886b7b11d6d4f05500d002a786
-
SHA512
da2da848812a40e02e547f6c047baa345492839ac322965721c1988ba862ae3535edb1f9928359db9d64df4eacfd0bcf4e412eaa762cb88e712f2d8b5a56f5b8
-
SSDEEP
12288:nmzHJEyfN1Y1uBPj39wZE8D3DERnLRmF8D6IHf8wh9HN8zFykCGrqD:uhfg14318bARM8FH/hX85yhz
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Evasion via Device Credential Deployment
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-