General
-
Target
d2ece286a2ca2405bbd07639c4cd74971bde93307ecacff01dc8ee7f4ec9e7cc
-
Size
96KB
-
Sample
241120-k6tnxavajb
-
MD5
0d3d2dbf0f673e5b5fdd426f64d41034
-
SHA1
c79d2cc2d3bfd1df1e66e3aaa5740213d30fe06a
-
SHA256
d2ece286a2ca2405bbd07639c4cd74971bde93307ecacff01dc8ee7f4ec9e7cc
-
SHA512
26397ec94ad9a937a331979a2305dc8fab5184daaba64ea017063a25827ea5d1343a1f60d0125008522b96c19f4f085e279bf2192ce993251a6528bc0b742d70
-
SSDEEP
1536:WkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgEHuS4hcTO97v7UYdEJma7:JKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgc
Behavioral task
behavioral1
Sample
d2ece286a2ca2405bbd07639c4cd74971bde93307ecacff01dc8ee7f4ec9e7cc.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2ece286a2ca2405bbd07639c4cd74971bde93307ecacff01dc8ee7f4ec9e7cc.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://bpsjambi.id/about/CcN5IbuInPQ/
https://greenlizard.co.za/amanah/pu8xeUOpqqq/
https://akuntansi.itny.ac.id/asset/NH7qwRrn81Taa0VVqpx/
https://www.yell.ge/nav_logo/x960wo3PHaIUm/
Targets
-
-
Target
d2ece286a2ca2405bbd07639c4cd74971bde93307ecacff01dc8ee7f4ec9e7cc
-
Size
96KB
-
MD5
0d3d2dbf0f673e5b5fdd426f64d41034
-
SHA1
c79d2cc2d3bfd1df1e66e3aaa5740213d30fe06a
-
SHA256
d2ece286a2ca2405bbd07639c4cd74971bde93307ecacff01dc8ee7f4ec9e7cc
-
SHA512
26397ec94ad9a937a331979a2305dc8fab5184daaba64ea017063a25827ea5d1343a1f60d0125008522b96c19f4f085e279bf2192ce993251a6528bc0b742d70
-
SSDEEP
1536:WkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgEHuS4hcTO97v7UYdEJma7:JKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgc
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-