General
-
Target
eccbf3a26af7b9ab2f772f17b1a69311b369c98af8beb0aa53b330b04123952f
-
Size
56KB
-
Sample
241120-2p6qksvcpg
-
MD5
6a2ccbb1f2307a9600f0adfc343246ff
-
SHA1
d968a7f7b4d37b4e74740a4879986194a3acd9b2
-
SHA256
eccbf3a26af7b9ab2f772f17b1a69311b369c98af8beb0aa53b330b04123952f
-
SHA512
8fa07b2727a29557c8aad0858d1875157e505739265ece08863a9ac283db0a0d432130a1d5268acc03a7ba92689a1c896e48a1ba16e76d6b81a9d05378fb90dc
-
SSDEEP
1536:VsKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgx5G9XSZ4Xsv2:aKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgK
Behavioral task
behavioral1
Sample
eccbf3a26af7b9ab2f772f17b1a69311b369c98af8beb0aa53b330b04123952f.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eccbf3a26af7b9ab2f772f17b1a69311b369c98af8beb0aa53b330b04123952f.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://dharian.org/_sharedtemplates/D3QgytUZsO7korYQrG/
http://digitalripple.com/scripts/4ovLPfq/
Targets
-
-
Target
eccbf3a26af7b9ab2f772f17b1a69311b369c98af8beb0aa53b330b04123952f
-
Size
56KB
-
MD5
6a2ccbb1f2307a9600f0adfc343246ff
-
SHA1
d968a7f7b4d37b4e74740a4879986194a3acd9b2
-
SHA256
eccbf3a26af7b9ab2f772f17b1a69311b369c98af8beb0aa53b330b04123952f
-
SHA512
8fa07b2727a29557c8aad0858d1875157e505739265ece08863a9ac283db0a0d432130a1d5268acc03a7ba92689a1c896e48a1ba16e76d6b81a9d05378fb90dc
-
SSDEEP
1536:VsKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgx5G9XSZ4Xsv2:aKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgK
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-