General
-
Target
88b9c4fb2391296daf82468c272abca61a13bd7eb162825066677fd9bd91f697
-
Size
96KB
-
Sample
241119-xak34svlen
-
MD5
140f65b78b627ea3cfd0fc7469ea3232
-
SHA1
93f9755691cbe1848cfbf12aa835f5a9171223c6
-
SHA256
88b9c4fb2391296daf82468c272abca61a13bd7eb162825066677fd9bd91f697
-
SHA512
e9f4ca6f1a33d0a1b544234e8569afb7d97ed044def84683080eee65168e2af8015a14e75931b9a3f60d08bf02a54c0243a745fdc14b4bd566c1b77b0dbf5e37
-
SSDEEP
1536:WkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgEHuS4hcTO97v7UYdEJma7:JKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg0
Behavioral task
behavioral1
Sample
88b9c4fb2391296daf82468c272abca61a13bd7eb162825066677fd9bd91f697.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
88b9c4fb2391296daf82468c272abca61a13bd7eb162825066677fd9bd91f697.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://bpsjambi.id/about/CcN5IbuInPQ/
https://greenlizard.co.za/amanah/pu8xeUOpqqq/
https://akuntansi.itny.ac.id/asset/NH7qwRrn81Taa0VVqpx/
https://www.yell.ge/nav_logo/x960wo3PHaIUm/
Targets
-
-
Target
88b9c4fb2391296daf82468c272abca61a13bd7eb162825066677fd9bd91f697
-
Size
96KB
-
MD5
140f65b78b627ea3cfd0fc7469ea3232
-
SHA1
93f9755691cbe1848cfbf12aa835f5a9171223c6
-
SHA256
88b9c4fb2391296daf82468c272abca61a13bd7eb162825066677fd9bd91f697
-
SHA512
e9f4ca6f1a33d0a1b544234e8569afb7d97ed044def84683080eee65168e2af8015a14e75931b9a3f60d08bf02a54c0243a745fdc14b4bd566c1b77b0dbf5e37
-
SSDEEP
1536:WkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgEHuS4hcTO97v7UYdEJma7:JKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg0
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-