General
-
Target
40e816366c01596e703feaa1924fea7150ad4187c9b0536db490cdc451ed5e15
-
Size
95KB
-
Sample
241120-l4yqhszmaq
-
MD5
c66424cc8b4242342f358c3e2992e1b3
-
SHA1
8b345f5b69245d7144771aa2f97e4e730ac17f39
-
SHA256
40e816366c01596e703feaa1924fea7150ad4187c9b0536db490cdc451ed5e15
-
SHA512
aad9d1d05a45800cd062d31eb79519c03627398ceafc11180e31ac72d96f7443b422b00090923fa35877a0d1adc2c5c9212efec674b1b7b6443284e16005cc11
-
SSDEEP
1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgNHuS4hcTO97v7UYdEJm5:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg0
Behavioral task
behavioral1
Sample
40e816366c01596e703feaa1924fea7150ad4187c9b0536db490cdc451ed5e15.xls
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
40e816366c01596e703feaa1924fea7150ad4187c9b0536db490cdc451ed5e15.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://fikti.bem.gunadarma.ac.id/SDM/YH8OJ1Zz8miBX/
http://ebuysa.co.za/yt-assets/yZ30/
http://3dstudioa.com.br/files/1ubPAB/
http://boardmart.co.za/images/DvMHPbTLn/
Targets
-
-
Target
40e816366c01596e703feaa1924fea7150ad4187c9b0536db490cdc451ed5e15
-
Size
95KB
-
MD5
c66424cc8b4242342f358c3e2992e1b3
-
SHA1
8b345f5b69245d7144771aa2f97e4e730ac17f39
-
SHA256
40e816366c01596e703feaa1924fea7150ad4187c9b0536db490cdc451ed5e15
-
SHA512
aad9d1d05a45800cd062d31eb79519c03627398ceafc11180e31ac72d96f7443b422b00090923fa35877a0d1adc2c5c9212efec674b1b7b6443284e16005cc11
-
SSDEEP
1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgNHuS4hcTO97v7UYdEJm5:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg0
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-