General
-
Target
ff97c98d8df6b30abc71d3ee84bda58f48b330579554822adb57d058e9f0a6ec
-
Size
46KB
-
Sample
241120-twmx2stpbr
-
MD5
a8114bda868bab2d3ca70b6fd78d20e3
-
SHA1
35b0399b61a87515d333d7ca0728eea27329757f
-
SHA256
ff97c98d8df6b30abc71d3ee84bda58f48b330579554822adb57d058e9f0a6ec
-
SHA512
2ca2f8d6bbb55ae3a456d2783c4d8bd8113aba017ae7c2669e9f7b4285051e3bcfbe8925e8dd880edec66fa6542b506a3f935fdf0128763197f9af81845314b6
-
SSDEEP
768:pDMPKpb8rGYrMPe3q7Q0XV5xtezE8vpI8UM+VQTUs77quK7KtGu6A:pYKpb8rGYrMPe3q7Q0XV5xtezE8vG8UG
Behavioral task
behavioral1
Sample
ff97c98d8df6b30abc71d3ee84bda58f48b330579554822adb57d058e9f0a6ec.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ff97c98d8df6b30abc71d3ee84bda58f48b330579554822adb57d058e9f0a6ec.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://zktecovn.com/wp-admin/xxfnYY4zwOpFOgu3g1t/
http://zacharywythe.com/pb_index_bak/SkEGB2c/
http://zonainformatica.es/aspnet_client/pVcppgi00Dk/
Targets
-
-
Target
ff97c98d8df6b30abc71d3ee84bda58f48b330579554822adb57d058e9f0a6ec
-
Size
46KB
-
MD5
a8114bda868bab2d3ca70b6fd78d20e3
-
SHA1
35b0399b61a87515d333d7ca0728eea27329757f
-
SHA256
ff97c98d8df6b30abc71d3ee84bda58f48b330579554822adb57d058e9f0a6ec
-
SHA512
2ca2f8d6bbb55ae3a456d2783c4d8bd8113aba017ae7c2669e9f7b4285051e3bcfbe8925e8dd880edec66fa6542b506a3f935fdf0128763197f9af81845314b6
-
SSDEEP
768:pDMPKpb8rGYrMPe3q7Q0XV5xtezE8vpI8UM+VQTUs77quK7KtGu6A:pYKpb8rGYrMPe3q7Q0XV5xtezE8vG8UG
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-