General
-
Target
aacf84eae39e69f30102eb3bd92a25231fd6a4aa5383e3cb1576234b6764b825
-
Size
142KB
-
Sample
241120-pdg7mawelc
-
MD5
a1dd00cea711f5908071a51f80af933c
-
SHA1
bbbf2e794c8de4dd7dcec1076263528f7a6f0105
-
SHA256
aacf84eae39e69f30102eb3bd92a25231fd6a4aa5383e3cb1576234b6764b825
-
SHA512
b9b902f66e5c8b900e186d75fce0c1ca1a091118411dff7e463219a1194434f3794552146122583cc8003d9685e62dcced2c608e16d8f977d4e16053043b1d7b
-
SSDEEP
3072:4Rk3hbdlylKsgqopeJBWhZFGkE+cL2NdAlhEvN8B/W6X1yxYovrepMUdQ6gSz4iq:Qk3hbdlylKsgqopeJBWhZFVE+W2NdAli
Behavioral task
behavioral1
Sample
aacf84eae39e69f30102eb3bd92a25231fd6a4aa5383e3cb1576234b6764b825.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
aacf84eae39e69f30102eb3bd92a25231fd6a4aa5383e3cb1576234b6764b825.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://185.7.214.7/fer/fer.html
Targets
-
-
Target
aacf84eae39e69f30102eb3bd92a25231fd6a4aa5383e3cb1576234b6764b825
-
Size
142KB
-
MD5
a1dd00cea711f5908071a51f80af933c
-
SHA1
bbbf2e794c8de4dd7dcec1076263528f7a6f0105
-
SHA256
aacf84eae39e69f30102eb3bd92a25231fd6a4aa5383e3cb1576234b6764b825
-
SHA512
b9b902f66e5c8b900e186d75fce0c1ca1a091118411dff7e463219a1194434f3794552146122583cc8003d9685e62dcced2c608e16d8f977d4e16053043b1d7b
-
SSDEEP
3072:4Rk3hbdlylKsgqopeJBWhZFGkE+cL2NdAlhEvN8B/W6X1yxYovrepMUdQ6gSz4iq:Qk3hbdlylKsgqopeJBWhZFVE+W2NdAli
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-