General
-
Target
8c2dc721e73bfc3308bfeedcb1c5fa0ab8251aff25a81d5021aa0913442415fb
-
Size
40KB
-
Sample
241120-djtxtsyglh
-
MD5
8b139f5518045037cffc46053bbc7c79
-
SHA1
b4b8cd9c32e06d523eb75c25203df16437cc2a1f
-
SHA256
8c2dc721e73bfc3308bfeedcb1c5fa0ab8251aff25a81d5021aa0913442415fb
-
SHA512
8e9b1349cd9fbaa7bfce949f82555424358062e4db79864cf785d7d5d4c617cd4b52ddb664a908c17d3fd493d3830952224ef7f552329b9f917ee7eab71c14c2
-
SSDEEP
768:pkZKpb8rGYrMPe3q7Q0XV5xtezEs/68/dgACCBn9kC+xbwcZfqG9tMvcVi1ls:p+Kpb8rGYrMPe3q7Q0XV5xtezEsi8/d0
Behavioral task
behavioral1
Sample
8c2dc721e73bfc3308bfeedcb1c5fa0ab8251aff25a81d5021aa0913442415fb.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8c2dc721e73bfc3308bfeedcb1c5fa0ab8251aff25a81d5021aa0913442415fb.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://easiercommunications.com/wp-content/w/
http://dulichdichvu.net/libraries/QhtrjCZymLp5EbqOdpKk/
https://www.whow.fr/wp-includes/H54Fgj0tG/
http://genccagdas.com.tr/assets/TTHOm833iNn3BxT/
http://heaventechnologies.com.pk/apitest/xdeAU0rx26LT9I/
http://goonboy.com/goonie/bSFz7Av/
Targets
-
-
Target
8c2dc721e73bfc3308bfeedcb1c5fa0ab8251aff25a81d5021aa0913442415fb
-
Size
40KB
-
MD5
8b139f5518045037cffc46053bbc7c79
-
SHA1
b4b8cd9c32e06d523eb75c25203df16437cc2a1f
-
SHA256
8c2dc721e73bfc3308bfeedcb1c5fa0ab8251aff25a81d5021aa0913442415fb
-
SHA512
8e9b1349cd9fbaa7bfce949f82555424358062e4db79864cf785d7d5d4c617cd4b52ddb664a908c17d3fd493d3830952224ef7f552329b9f917ee7eab71c14c2
-
SSDEEP
768:pkZKpb8rGYrMPe3q7Q0XV5xtezEs/68/dgACCBn9kC+xbwcZfqG9tMvcVi1ls:p+Kpb8rGYrMPe3q7Q0XV5xtezEsi8/d0
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-