General
-
Target
cf1ece29b7f8224cd20d9cfef8dbb20e9948f411dcdb9914a6e729561513086b
-
Size
228KB
-
Sample
241120-3k8j2swgml
-
MD5
db1af58f3332ff6f0a504bd7bf0e2971
-
SHA1
5bb6ad1dd74e0a2c39952476542c943fd8926552
-
SHA256
cf1ece29b7f8224cd20d9cfef8dbb20e9948f411dcdb9914a6e729561513086b
-
SHA512
58b08203210e8b0d76e254623f68f8d0a0146d777fe8ef98244b05ce53d7b528016efc42f4f4b4ed6d38d66457cfc3d0684e7310ef4894d9640cdf154325d268
-
SSDEEP
3072:3Yy0u8YGgjv+ZvchmkHcI/o1/Vb6///////////////////////////////////7:50uXnWFchmmcI/o1/qJQ29Iey3HwUK
Behavioral task
behavioral1
Sample
cf1ece29b7f8224cd20d9cfef8dbb20e9948f411dcdb9914a6e729561513086b.doc
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
cf1ece29b7f8224cd20d9cfef8dbb20e9948f411dcdb9914a6e729561513086b.doc
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://lepik.pri.ee/melius/tv471975685/
http://metanopoly.com/cgi-bin/Krt1152299/
http://michaeljunk.de/assets/file/HcQLJ/
http://minerva-bg.net/tutorials/attach/ntHZgJIgtRB/
http://michna.de/cgi-bin/attach/LUHJFwPAGqOw/
http://mietelski.de/AdvancedGuestbook_01/uy0gyfv41428711/
http://miragestudio.ro/journal/attach/gCmLwZCcGjpMe/
Targets
-
-
Target
cf1ece29b7f8224cd20d9cfef8dbb20e9948f411dcdb9914a6e729561513086b
-
Size
228KB
-
MD5
db1af58f3332ff6f0a504bd7bf0e2971
-
SHA1
5bb6ad1dd74e0a2c39952476542c943fd8926552
-
SHA256
cf1ece29b7f8224cd20d9cfef8dbb20e9948f411dcdb9914a6e729561513086b
-
SHA512
58b08203210e8b0d76e254623f68f8d0a0146d777fe8ef98244b05ce53d7b528016efc42f4f4b4ed6d38d66457cfc3d0684e7310ef4894d9640cdf154325d268
-
SSDEEP
3072:3Yy0u8YGgjv+ZvchmkHcI/o1/Vb6///////////////////////////////////7:50uXnWFchmmcI/o1/qJQ29Iey3HwUK
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-