General
-
Target
7a131ae2f6bee4502aa717926cda6045a5528ba6a25d3dd3a5fbbb880af942ce.xls
-
Size
1.1MB
-
Sample
241107-c6matssnhv
-
MD5
2fa05b6430d95473b907dfe83338f462
-
SHA1
3f830f801f4225891075a0fc5c2ef6cc8bc361cb
-
SHA256
7a131ae2f6bee4502aa717926cda6045a5528ba6a25d3dd3a5fbbb880af942ce
-
SHA512
fabf49e054a9fcf6cabb82f64c319a713adc058dbe2406a29b9744473bc94b960eb7208dc58855cfb14dd3442d70fd753054201877c451d042e03b12e13a7318
-
SSDEEP
24576:5yaZxvseowaDI9eqvBw2L+LXlkWlXTgNXMAdsNUnh:5T0DIRvBwCuXlpM8usNAh
Static task
static1
Behavioral task
behavioral1
Sample
7a131ae2f6bee4502aa717926cda6045a5528ba6a25d3dd3a5fbbb880af942ce.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7a131ae2f6bee4502aa717926cda6045a5528ba6a25d3dd3a5fbbb880af942ce.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1UyHqwrnXClKBJ3j63Ll1t2StVgGxbSt0
https://drive.google.com/uc?export=download&id=1UyHqwrnXClKBJ3j63Ll1t2StVgGxbSt0
Targets
-
-
Target
7a131ae2f6bee4502aa717926cda6045a5528ba6a25d3dd3a5fbbb880af942ce.xls
-
Size
1.1MB
-
MD5
2fa05b6430d95473b907dfe83338f462
-
SHA1
3f830f801f4225891075a0fc5c2ef6cc8bc361cb
-
SHA256
7a131ae2f6bee4502aa717926cda6045a5528ba6a25d3dd3a5fbbb880af942ce
-
SHA512
fabf49e054a9fcf6cabb82f64c319a713adc058dbe2406a29b9744473bc94b960eb7208dc58855cfb14dd3442d70fd753054201877c451d042e03b12e13a7318
-
SSDEEP
24576:5yaZxvseowaDI9eqvBw2L+LXlkWlXTgNXMAdsNUnh:5T0DIRvBwCuXlpM8usNAh
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Evasion via Device Credential Deployment
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-