General
-
Target
67fedda89b5b9e16abdd1fb17ae009ea02f3b296db3d063a8eef1b1ee92879ce
-
Size
96KB
-
Sample
241120-qwa2psxbpg
-
MD5
b6a74d5a9568908e9b0a6d6a6466a1d7
-
SHA1
8b9e805e5e02d4d4cac2191a58b1cca07a764693
-
SHA256
67fedda89b5b9e16abdd1fb17ae009ea02f3b296db3d063a8eef1b1ee92879ce
-
SHA512
09b5df0702fc308f488577004a2a2d6c3e4a4538762977b9fc82b9ddc32f2085bb9f0363e245d9ef6c4af2157bd6fedf812fda35c2ec4206865e6074d08e304c
-
SSDEEP
1536:WkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgEHuS4hcTO97v7UYdEJmm7:JKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgY
Behavioral task
behavioral1
Sample
67fedda89b5b9e16abdd1fb17ae009ea02f3b296db3d063a8eef1b1ee92879ce.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
67fedda89b5b9e16abdd1fb17ae009ea02f3b296db3d063a8eef1b1ee92879ce.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://bpsjambi.id/about/CcN5IbuInPQ/
https://greenlizard.co.za/amanah/pu8xeUOpqqq/
https://akuntansi.itny.ac.id/asset/NH7qwRrn81Taa0VVqpx/
https://www.yell.ge/nav_logo/x960wo3PHaIUm/
Targets
-
-
Target
67fedda89b5b9e16abdd1fb17ae009ea02f3b296db3d063a8eef1b1ee92879ce
-
Size
96KB
-
MD5
b6a74d5a9568908e9b0a6d6a6466a1d7
-
SHA1
8b9e805e5e02d4d4cac2191a58b1cca07a764693
-
SHA256
67fedda89b5b9e16abdd1fb17ae009ea02f3b296db3d063a8eef1b1ee92879ce
-
SHA512
09b5df0702fc308f488577004a2a2d6c3e4a4538762977b9fc82b9ddc32f2085bb9f0363e245d9ef6c4af2157bd6fedf812fda35c2ec4206865e6074d08e304c
-
SSDEEP
1536:WkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgEHuS4hcTO97v7UYdEJmm7:JKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgY
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-