General
-
Target
d43224a19eff8b25663d534e7a3a6b8967e83732fbbf6e42a0adbdcffe582994
-
Size
48KB
-
Sample
241120-mgtzgszndl
-
MD5
10646384c1614b7dcfdf9f1297e38052
-
SHA1
6a175e4599f94e889acf0b58d9655685e0354533
-
SHA256
d43224a19eff8b25663d534e7a3a6b8967e83732fbbf6e42a0adbdcffe582994
-
SHA512
a6b3a8cb3f31f18b44f27471489caf2a1d984b03651a674d3114b9d7a7983208ec20e10959f70c35b835b8a7a592e98c501d958c4388f7ba64c052cdf3c7f5d7
-
SSDEEP
768:uDM52tfQXi8vgLZkTOHkQT51Vp6AwPdM8gQ6JL/K9abdDKHGeWmqkySbuR/3ej7Z:u62tfQXi8vgLZkTOHkQT51Vp6AwPe8g2
Behavioral task
behavioral1
Sample
d43224a19eff8b25663d534e7a3a6b8967e83732fbbf6e42a0adbdcffe582994.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d43224a19eff8b25663d534e7a3a6b8967e83732fbbf6e42a0adbdcffe582994.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://famesa.com.ar/dos/gaa/
https://www.fantasyclub.com.br/imgs/rggmVTfvT/
http://ecoarch.com.tw/cgi-bin/vWW/
https://dp-flex.co.jp/cgi-bin/Bt3Ycq5Tix/
http://dharmacomunicacao.com.br/OLD/PjBkVBhUH/
Targets
-
-
Target
d43224a19eff8b25663d534e7a3a6b8967e83732fbbf6e42a0adbdcffe582994
-
Size
48KB
-
MD5
10646384c1614b7dcfdf9f1297e38052
-
SHA1
6a175e4599f94e889acf0b58d9655685e0354533
-
SHA256
d43224a19eff8b25663d534e7a3a6b8967e83732fbbf6e42a0adbdcffe582994
-
SHA512
a6b3a8cb3f31f18b44f27471489caf2a1d984b03651a674d3114b9d7a7983208ec20e10959f70c35b835b8a7a592e98c501d958c4388f7ba64c052cdf3c7f5d7
-
SSDEEP
768:uDM52tfQXi8vgLZkTOHkQT51Vp6AwPdM8gQ6JL/K9abdDKHGeWmqkySbuR/3ej7Z:u62tfQXi8vgLZkTOHkQT51Vp6AwPe8g2
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-