General
-
Target
cea5afd13b92e129cb92104427d1d7915c5ccce1ba85ef314f2db1d6e115b456.xlsx
-
Size
673KB
-
Sample
241107-dsj4zsvaka
-
MD5
132a3570cc09c2e1e315e008004a0d1e
-
SHA1
3866bceec9cf288999c245fe6949b9d0ce42ca0b
-
SHA256
cea5afd13b92e129cb92104427d1d7915c5ccce1ba85ef314f2db1d6e115b456
-
SHA512
fa2a60743b3c4112fbccb1393b5d165520a8f12c7e664e070e70d16f9b0cf0eab586314506d16d9f80140c1f9cf411bcc8067beb6b78111ea23ca11a83e6a0fe
-
SSDEEP
12288:dZKLu8Y8imd6uYl3In1Ap9/GPpzDBcm86yUsMDbGjNgGcivN3h8f4Js:/KPY8TwDVm1k9/GdBurUNDghvj8P
Static task
static1
Behavioral task
behavioral1
Sample
cea5afd13b92e129cb92104427d1d7915c5ccce1ba85ef314f2db1d6e115b456.xlam
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
cea5afd13b92e129cb92104427d1d7915c5ccce1ba85ef314f2db1d6e115b456.xlam
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1zxD-qVXvvO25GmV9m6xLhdVhXRzA0JEe
https://drive.google.com/uc?export=download&id=1zxD-qVXvvO25GmV9m6xLhdVhXRzA0JEe
Targets
-
-
Target
cea5afd13b92e129cb92104427d1d7915c5ccce1ba85ef314f2db1d6e115b456.xlsx
-
Size
673KB
-
MD5
132a3570cc09c2e1e315e008004a0d1e
-
SHA1
3866bceec9cf288999c245fe6949b9d0ce42ca0b
-
SHA256
cea5afd13b92e129cb92104427d1d7915c5ccce1ba85ef314f2db1d6e115b456
-
SHA512
fa2a60743b3c4112fbccb1393b5d165520a8f12c7e664e070e70d16f9b0cf0eab586314506d16d9f80140c1f9cf411bcc8067beb6b78111ea23ca11a83e6a0fe
-
SSDEEP
12288:dZKLu8Y8imd6uYl3In1Ap9/GPpzDBcm86yUsMDbGjNgGcivN3h8f4Js:/KPY8TwDVm1k9/GdBurUNDghvj8P
-
Blocklisted process makes network request
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-