General
-
Target
e0ca8c2fa19a0a8f7ab7f69ee18fce0f196c662f4bb810950cb5d4150e6a571f
-
Size
94KB
-
Sample
241120-1wbckstrbs
-
MD5
0c740931177e11a60872cd4923bc38c5
-
SHA1
b23e21af7e824e4e302090c3c461cc847cf9dbe8
-
SHA256
e0ca8c2fa19a0a8f7ab7f69ee18fce0f196c662f4bb810950cb5d4150e6a571f
-
SHA512
71c69a5707762b7bae48cf059c11b40c5028717a9d5e9bc173bd3ef82d6dc0def8c8782f0bae093ffe89efd6ef4f6fccf1088aa92b02ac1896b03d3694dc4bc1
-
SSDEEP
1536:nFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgiHuS4hcTO97v7UYdEJmFCy:FKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgz
Behavioral task
behavioral1
Sample
e0ca8c2fa19a0a8f7ab7f69ee18fce0f196c662f4bb810950cb5d4150e6a571f.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0ca8c2fa19a0a8f7ab7f69ee18fce0f196c662f4bb810950cb5d4150e6a571f.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://ewingconsulting.com/wp-includes/1sqrshC/
http://www.llev.com.br/app/W2ehSSGWXTBpOf/
http://digital21.cl/genchile/Pp1LDfwHR0IJPWHpq3R/
http://nellydwiputri.co.id/images/lZfuoNe2vyr/
Targets
-
-
Target
e0ca8c2fa19a0a8f7ab7f69ee18fce0f196c662f4bb810950cb5d4150e6a571f
-
Size
94KB
-
MD5
0c740931177e11a60872cd4923bc38c5
-
SHA1
b23e21af7e824e4e302090c3c461cc847cf9dbe8
-
SHA256
e0ca8c2fa19a0a8f7ab7f69ee18fce0f196c662f4bb810950cb5d4150e6a571f
-
SHA512
71c69a5707762b7bae48cf059c11b40c5028717a9d5e9bc173bd3ef82d6dc0def8c8782f0bae093ffe89efd6ef4f6fccf1088aa92b02ac1896b03d3694dc4bc1
-
SSDEEP
1536:nFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgiHuS4hcTO97v7UYdEJmFCy:FKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgz
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-