General
-
Target
cf010bfe6e85ff6fb9cae9aefd23e782665a3cdd3cc85e3f3f7754c12ff8e786
-
Size
141KB
-
Sample
241120-lzw15avdkc
-
MD5
1482095c861d11dd62819d667f66df9f
-
SHA1
faeb924c14ca70dfd4f8534a65ff354a35618336
-
SHA256
cf010bfe6e85ff6fb9cae9aefd23e782665a3cdd3cc85e3f3f7754c12ff8e786
-
SHA512
7201c08488f36934747551968a960590ea4989db9ea204d81e48d52babd78555872e1f24f5e56ac47417416ac80758b5d4c986bfc033f75ae32d1fbeb2f2650d
-
SSDEEP
3072:4Rk3hbdlylKsgqopeJBWhZFGkE+cL2NdAlhEvN8B/W6X1yxYovrepMUdQ6gSz4iq:Qk3hbdlylKsgqopeJBWhZFVE+W2NdAli
Behavioral task
behavioral1
Sample
cf010bfe6e85ff6fb9cae9aefd23e782665a3cdd3cc85e3f3f7754c12ff8e786.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf010bfe6e85ff6fb9cae9aefd23e782665a3cdd3cc85e3f3f7754c12ff8e786.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://185.7.214.7/fer/fer.html
Targets
-
-
Target
cf010bfe6e85ff6fb9cae9aefd23e782665a3cdd3cc85e3f3f7754c12ff8e786
-
Size
141KB
-
MD5
1482095c861d11dd62819d667f66df9f
-
SHA1
faeb924c14ca70dfd4f8534a65ff354a35618336
-
SHA256
cf010bfe6e85ff6fb9cae9aefd23e782665a3cdd3cc85e3f3f7754c12ff8e786
-
SHA512
7201c08488f36934747551968a960590ea4989db9ea204d81e48d52babd78555872e1f24f5e56ac47417416ac80758b5d4c986bfc033f75ae32d1fbeb2f2650d
-
SSDEEP
3072:4Rk3hbdlylKsgqopeJBWhZFGkE+cL2NdAlhEvN8B/W6X1yxYovrepMUdQ6gSz4iq:Qk3hbdlylKsgqopeJBWhZFVE+W2NdAli
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-