General
-
Target
Po docs.xls
-
Size
476KB
-
Sample
241030-g4btjawqfv
-
MD5
4cbbf7815ee93202eb78ae0815ce9c2b
-
SHA1
093f0bbc7422766b465332e1c8f608422e702329
-
SHA256
dc8cc8622001466d8dd715db5cfd1c7e930f1c201fd1a37106f5191ae68a33e1
-
SHA512
790781e0a6dc840634f36fe5ef9863a1a0e31b471183968f401e757d2ad2d8010224abb98111a7e3d44f4d6d063b455c3f91edcdde34a364c52afa03ce3cca15
-
SSDEEP
12288:skef66BBGRUdbU6jVzs6dDuipHJ30VQdB:G66iRU5U6jpdDtHt0aB
Static task
static1
Behavioral task
behavioral1
Sample
Po docs.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Po docs.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
Targets
-
-
Target
Po docs.xls
-
Size
476KB
-
MD5
4cbbf7815ee93202eb78ae0815ce9c2b
-
SHA1
093f0bbc7422766b465332e1c8f608422e702329
-
SHA256
dc8cc8622001466d8dd715db5cfd1c7e930f1c201fd1a37106f5191ae68a33e1
-
SHA512
790781e0a6dc840634f36fe5ef9863a1a0e31b471183968f401e757d2ad2d8010224abb98111a7e3d44f4d6d063b455c3f91edcdde34a364c52afa03ce3cca15
-
SSDEEP
12288:skef66BBGRUdbU6jVzs6dDuipHJ30VQdB:G66iRU5U6jpdDtHt0aB
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Evasion via Device Credential Deployment
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-