General
-
Target
a0d5e6163359829b27414a2f10e528a6f40f9953f3f23406d444f692660b7d91
-
Size
80KB
-
Sample
241119-wt8svazgjm
-
MD5
886cf218c603922b1782fa6326caea26
-
SHA1
1f37de817ffe191444948451be0a09ed43cdf830
-
SHA256
a0d5e6163359829b27414a2f10e528a6f40f9953f3f23406d444f692660b7d91
-
SHA512
7446bae844bea4d8070be320812c374b7b29027705a866c4cea70b5edd920506855b24633efd5d9019ba5b94db34e19604ded67e6a3ef325a73344d704af62f8
-
SSDEEP
1536:ROOKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgFQHuS4VcTO9/r7UYdEJeFO:RBKpb8rGYrMPe3q7Q0XV5xtezEsi8/dz
Behavioral task
behavioral1
Sample
a0d5e6163359829b27414a2f10e528a6f40f9953f3f23406d444f692660b7d91.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a0d5e6163359829b27414a2f10e528a6f40f9953f3f23406d444f692660b7d91.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://beeslandkerman.ir/XPFvBDrNkT/lUkOx4VAOizId7u/
http://cerdi.com/_derived/J4Fu7VmGZQ7rGA/
https://www.chasingmavericks.co.ke/agendaafrikadebates.co.ke/QznOFMKV9R/
http://bsbmakina.com.tr/logo/eVWaAWm/
Targets
-
-
Target
a0d5e6163359829b27414a2f10e528a6f40f9953f3f23406d444f692660b7d91
-
Size
80KB
-
MD5
886cf218c603922b1782fa6326caea26
-
SHA1
1f37de817ffe191444948451be0a09ed43cdf830
-
SHA256
a0d5e6163359829b27414a2f10e528a6f40f9953f3f23406d444f692660b7d91
-
SHA512
7446bae844bea4d8070be320812c374b7b29027705a866c4cea70b5edd920506855b24633efd5d9019ba5b94db34e19604ded67e6a3ef325a73344d704af62f8
-
SSDEEP
1536:ROOKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgFQHuS4VcTO9/r7UYdEJeFO:RBKpb8rGYrMPe3q7Q0XV5xtezEsi8/dz
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-