General
-
Target
d2efa420a245e76e5418e68716224b5091be819dea739c2bb93bcb960852952c
-
Size
95KB
-
Sample
241120-l2d84awbln
-
MD5
2afcb10cd2606d11f84dcab152cd38b1
-
SHA1
210b11a4cbd9c32da4e5dbad4d01d62006cbc624
-
SHA256
d2efa420a245e76e5418e68716224b5091be819dea739c2bb93bcb960852952c
-
SHA512
bf6d21a78838369ef37f16a0f9fda36c83dcc63eee6185bd752fd800eb201939e377f1257e4a1f866cd62582d301a270a779e1f8ea9cf56871e4a7b8f6b1824d
-
SSDEEP
1536:PFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgCHuS4hcTO97v7UYdEJmIr:tKpb8rGYrMPe3q7Q0XV5xtezEsi8/dge
Behavioral task
behavioral1
Sample
d2efa420a245e76e5418e68716224b5091be819dea739c2bb93bcb960852952c.xls
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d2efa420a245e76e5418e68716224b5091be819dea739c2bb93bcb960852952c.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://www.sunflowerlaboratory.in/fonts/79Tq62ly/
http://dirigent.co.uk/vardagsekonomi/iC36jJ4J1cf/
http://agtrade.hu/images/kiQYmOs2tSKq/
https://www.zachboyle.com/wp-admin/EA470ZrTGNkuA/
Targets
-
-
Target
d2efa420a245e76e5418e68716224b5091be819dea739c2bb93bcb960852952c
-
Size
95KB
-
MD5
2afcb10cd2606d11f84dcab152cd38b1
-
SHA1
210b11a4cbd9c32da4e5dbad4d01d62006cbc624
-
SHA256
d2efa420a245e76e5418e68716224b5091be819dea739c2bb93bcb960852952c
-
SHA512
bf6d21a78838369ef37f16a0f9fda36c83dcc63eee6185bd752fd800eb201939e377f1257e4a1f866cd62582d301a270a779e1f8ea9cf56871e4a7b8f6b1824d
-
SSDEEP
1536:PFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgCHuS4hcTO97v7UYdEJmIr:tKpb8rGYrMPe3q7Q0XV5xtezEsi8/dge
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-