General
-
Target
36eb7eacf7be5a35935073d30e277a00b7cc4879b248587f62c3bcaa448bf147
-
Size
56KB
-
Sample
241120-2ed8ksvame
-
MD5
c0940c4357725c628c9c73b9c48e8c42
-
SHA1
79f1f61e9cc3a7fb17db987a445ce120c384af7c
-
SHA256
36eb7eacf7be5a35935073d30e277a00b7cc4879b248587f62c3bcaa448bf147
-
SHA512
46a6216bfc597e643b5a9c7c8ba735c70e94de48a41c04ab83b0e6a8d1323ec2a380909493608a75a34e54d1d1895113aa50407463fac3960f25fd2d8021a7b0
-
SSDEEP
1536:VsKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgx5G9XSZ4XsvW:aKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgq
Behavioral task
behavioral1
Sample
36eb7eacf7be5a35935073d30e277a00b7cc4879b248587f62c3bcaa448bf147.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
36eb7eacf7be5a35935073d30e277a00b7cc4879b248587f62c3bcaa448bf147.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://dharian.org/_sharedtemplates/D3QgytUZsO7korYQrG/
http://digitalripple.com/scripts/4ovLPfq/
Targets
-
-
Target
36eb7eacf7be5a35935073d30e277a00b7cc4879b248587f62c3bcaa448bf147
-
Size
56KB
-
MD5
c0940c4357725c628c9c73b9c48e8c42
-
SHA1
79f1f61e9cc3a7fb17db987a445ce120c384af7c
-
SHA256
36eb7eacf7be5a35935073d30e277a00b7cc4879b248587f62c3bcaa448bf147
-
SHA512
46a6216bfc597e643b5a9c7c8ba735c70e94de48a41c04ab83b0e6a8d1323ec2a380909493608a75a34e54d1d1895113aa50407463fac3960f25fd2d8021a7b0
-
SSDEEP
1536:VsKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgx5G9XSZ4XsvW:aKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgq
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-