General
-
Target
0a9aac9f55670caedfe33e20159a8baeda581dc3f62f86a2e547d7b4017e9cfc
-
Size
60KB
-
Sample
241120-1mmz1stdrf
-
MD5
fd591f11cd0357fa1553a6f2f6898058
-
SHA1
90ac34be36685b69a00d1fb517b0c263fedc455a
-
SHA256
0a9aac9f55670caedfe33e20159a8baeda581dc3f62f86a2e547d7b4017e9cfc
-
SHA512
aace4e1f1ab1f0f1c5afe943ba27bbef6675c9dfe7106b9e6dc8e0095a8a35fdc8873deabdc308af839f36703114ff00425b7b6eac37eca81093d2ce110cb62a
-
SSDEEP
768:hXTJ1WeFGk/HmC5+abzpB+tqnciAyBsPb8P+3nIZ3I9x8q/xV850v49xsx0Vv3Oj:hXtXH59/hcQOU+XIZ3Sxa0vMax0VPO6w
Behavioral task
behavioral1
Sample
MedWin.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
MedWin.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://filecabinet.digitalechoes.co.uk/wp-admin/NC/
Targets
-
-
Target
MedWin.xls
-
Size
104KB
-
MD5
9f2a3f3ff7c400069f011102ba88560f
-
SHA1
7cd0d84516db5b598549df82f4a427dd32cd3e1d
-
SHA256
f79f56d7a2467d6f73e634be22ac623ee658aa9778b34f23913f9749a2fdd26c
-
SHA512
80dc9955db7fd513db41d05f33ae4a2b713029a649d71ae01d2f1486d12af2a604525e920cd7ab22002b83833aa4322e16eca16dceffaacc0dd25569bf77f46c
-
SSDEEP
3072:yWKpbdrHYrMue8q7QPX+5xtekEdi8/dgeJ0depMHwGGqd4Mk:nKpbdrHYrMue8q7QPX+5xtFEdi8/dgeN
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-