General
-
Target
7bb679fd3535464237922aac06d99bcd687e4a1c4ccc825e0986981e0eed7c49
-
Size
95KB
-
Sample
241119-xhwvkszmbs
-
MD5
2d3b1a5dad99e32f133e13f260519b6a
-
SHA1
3f488f1f85d6daa8d4376a8c232b9efc209a1c41
-
SHA256
7bb679fd3535464237922aac06d99bcd687e4a1c4ccc825e0986981e0eed7c49
-
SHA512
40b022c41cf0c2b57182134fb02a2e5d25858b0cc89d4b5919f05f229758e174796f81b934ebb79dd7564830f6b173d0805633902e29fd007e10a5d557e7583e
-
SSDEEP
1536:PFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgCHuS4hcTO97v7UYdEJmor:tKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg+
Behavioral task
behavioral1
Sample
7bb679fd3535464237922aac06d99bcd687e4a1c4ccc825e0986981e0eed7c49.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7bb679fd3535464237922aac06d99bcd687e4a1c4ccc825e0986981e0eed7c49.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://www.sunflowerlaboratory.in/fonts/79Tq62ly/
http://dirigent.co.uk/vardagsekonomi/iC36jJ4J1cf/
http://agtrade.hu/images/kiQYmOs2tSKq/
https://www.zachboyle.com/wp-admin/EA470ZrTGNkuA/
Targets
-
-
Target
7bb679fd3535464237922aac06d99bcd687e4a1c4ccc825e0986981e0eed7c49
-
Size
95KB
-
MD5
2d3b1a5dad99e32f133e13f260519b6a
-
SHA1
3f488f1f85d6daa8d4376a8c232b9efc209a1c41
-
SHA256
7bb679fd3535464237922aac06d99bcd687e4a1c4ccc825e0986981e0eed7c49
-
SHA512
40b022c41cf0c2b57182134fb02a2e5d25858b0cc89d4b5919f05f229758e174796f81b934ebb79dd7564830f6b173d0805633902e29fd007e10a5d557e7583e
-
SSDEEP
1536:PFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgCHuS4hcTO97v7UYdEJmor:tKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg+
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-