General
-
Target
22cc5f027f58624d6d7b256f7c86f0fbfb56d892ce04834782078ad1c58ff9fe
-
Size
71KB
-
Sample
241120-prk6fawgjb
-
MD5
1f4b74b40be109d5a7e1f6fc7d2b2a77
-
SHA1
b9be35374f2d074c0ae9b606e8993a67767de56b
-
SHA256
22cc5f027f58624d6d7b256f7c86f0fbfb56d892ce04834782078ad1c58ff9fe
-
SHA512
500ec22f3f55e4e4ef0add0084e03f79829cb58380cbe92eca43cc6db6ec4320a5cbfa3f0fb8bc4a447bcb04ba3720a2850d3e693e4305d2a82ee1f502939c08
-
SSDEEP
1536:bpEk3hbdlylKsgqopeJBWhZFGkE+cL2NdA8eXZiozeOgXVZKyaZpvyR1kZkJvU+:bCk3hbdlylKsgqopeJBWhZFGkE+cL2Nr
Behavioral task
behavioral1
Sample
22cc5f027f58624d6d7b256f7c86f0fbfb56d892ce04834782078ad1c58ff9fe.xls
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
22cc5f027f58624d6d7b256f7c86f0fbfb56d892ce04834782078ad1c58ff9fe.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://185.7.214.7/fer/fe2.html
Targets
-
-
Target
22cc5f027f58624d6d7b256f7c86f0fbfb56d892ce04834782078ad1c58ff9fe
-
Size
71KB
-
MD5
1f4b74b40be109d5a7e1f6fc7d2b2a77
-
SHA1
b9be35374f2d074c0ae9b606e8993a67767de56b
-
SHA256
22cc5f027f58624d6d7b256f7c86f0fbfb56d892ce04834782078ad1c58ff9fe
-
SHA512
500ec22f3f55e4e4ef0add0084e03f79829cb58380cbe92eca43cc6db6ec4320a5cbfa3f0fb8bc4a447bcb04ba3720a2850d3e693e4305d2a82ee1f502939c08
-
SSDEEP
1536:bpEk3hbdlylKsgqopeJBWhZFGkE+cL2NdA8eXZiozeOgXVZKyaZpvyR1kZkJvU+:bCk3hbdlylKsgqopeJBWhZFGkE+cL2Nr
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-