General
-
Target
417115d3338ded571f81b84680dcc25446114049372be007c17a5c578390f6e4
-
Size
80KB
-
Sample
241120-sz453aynft
-
MD5
b2446bcd29c0d2eb9a58a626b4c63ddb
-
SHA1
e3340a35313aeb36ac88181901e70ac2d75a73ef
-
SHA256
417115d3338ded571f81b84680dcc25446114049372be007c17a5c578390f6e4
-
SHA512
122ca3518a66b49bb457a05cd3cd470e18e1c73c14fd114e9307e4be4d36f365b9ecf6b4974a41b9f19dbd987b7da0f4519da81e693bf9e6928492091fd80a01
-
SSDEEP
1536:ROOKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgFQHuS4VcTO9/r7UYdEJeF6:RBKpb8rGYrMPe3q7Q0XV5xtezEsi8/dX
Behavioral task
behavioral1
Sample
417115d3338ded571f81b84680dcc25446114049372be007c17a5c578390f6e4.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
417115d3338ded571f81b84680dcc25446114049372be007c17a5c578390f6e4.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://beeslandkerman.ir/XPFvBDrNkT/lUkOx4VAOizId7u/
http://cerdi.com/_derived/J4Fu7VmGZQ7rGA/
https://www.chasingmavericks.co.ke/agendaafrikadebates.co.ke/QznOFMKV9R/
http://bsbmakina.com.tr/logo/eVWaAWm/
Targets
-
-
Target
417115d3338ded571f81b84680dcc25446114049372be007c17a5c578390f6e4
-
Size
80KB
-
MD5
b2446bcd29c0d2eb9a58a626b4c63ddb
-
SHA1
e3340a35313aeb36ac88181901e70ac2d75a73ef
-
SHA256
417115d3338ded571f81b84680dcc25446114049372be007c17a5c578390f6e4
-
SHA512
122ca3518a66b49bb457a05cd3cd470e18e1c73c14fd114e9307e4be4d36f365b9ecf6b4974a41b9f19dbd987b7da0f4519da81e693bf9e6928492091fd80a01
-
SSDEEP
1536:ROOKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgFQHuS4VcTO9/r7UYdEJeF6:RBKpb8rGYrMPe3q7Q0XV5xtezEsi8/dX
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-