General
-
Target
Aviso de pago.xla
-
Size
645KB
-
Sample
241106-jpj8gawemc
-
MD5
edc3869ba8b78118979f05fbe9098b83
-
SHA1
3129170a970c1ba4fe05b5bbe4b88a1b5da03db8
-
SHA256
057dee21a70fecbb36618b33c27ad7c059c4ab99e0937e01fe398fb30af5bd98
-
SHA512
9e3e435617361fc438daf3700580f702df6f38f43a2ec1105bacc23e722235168f4eca62c44850c3fc732ebc64d98e5ed932d0c8827e5c700854b868ebfeb652
-
SSDEEP
12288:ubWNHd0zBcp2b6eTPOYlgSFG7nRzBMLu2ogAEWalBdU:6sdDMmeT2Y5WQocWi
Static task
static1
Behavioral task
behavioral1
Sample
Aviso de pago.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Aviso de pago.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1UyHqwrnXClKBJ3j63Ll1t2StVgGxbSt0
https://drive.google.com/uc?export=download&id=1UyHqwrnXClKBJ3j63Ll1t2StVgGxbSt0
Targets
-
-
Target
Aviso de pago.xla
-
Size
645KB
-
MD5
edc3869ba8b78118979f05fbe9098b83
-
SHA1
3129170a970c1ba4fe05b5bbe4b88a1b5da03db8
-
SHA256
057dee21a70fecbb36618b33c27ad7c059c4ab99e0937e01fe398fb30af5bd98
-
SHA512
9e3e435617361fc438daf3700580f702df6f38f43a2ec1105bacc23e722235168f4eca62c44850c3fc732ebc64d98e5ed932d0c8827e5c700854b868ebfeb652
-
SSDEEP
12288:ubWNHd0zBcp2b6eTPOYlgSFG7nRzBMLu2ogAEWalBdU:6sdDMmeT2Y5WQocWi
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Evasion via Device Credential Deployment
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-