General
-
Target
a06c899c395e67e8d9cf518b134cab0f77bdc50f8090ea40dd168c3913bfd3bf
-
Size
80KB
-
Sample
241120-v2f75avlcj
-
MD5
6cef783310b37e3c29c02679cb3f68f9
-
SHA1
a681ad578bd865fa5ee239c7f92965c9a40cffb8
-
SHA256
a06c899c395e67e8d9cf518b134cab0f77bdc50f8090ea40dd168c3913bfd3bf
-
SHA512
77b2b2e24e73328deee1000eb7ab6576c795eb33d29ffe49bb40e0bf44efb1a55800e919d840560d714ddc25358333abdbe8ad948c21565b7201ad2e92c5fdb3
-
SSDEEP
1536:UTOKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgQbHuS4VcTO9/r7UYdEJep:UaKpb8rGYrMPe3q7Q0XV5xtezEsi8/de
Behavioral task
behavioral1
Sample
a06c899c395e67e8d9cf518b134cab0f77bdc50f8090ea40dd168c3913bfd3bf.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a06c899c395e67e8d9cf518b134cab0f77bdc50f8090ea40dd168c3913bfd3bf.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://www.boraintercambios.com.br/wp-includes/AN4ixiH4Th/
https://brigadir.com/bkp/SwrVs4yU/
http://handboog6.nl/META-INF/f/
http://brb-ljubuski.com/wp-content/2MODCk0UZasTCL6tm/
Targets
-
-
Target
a06c899c395e67e8d9cf518b134cab0f77bdc50f8090ea40dd168c3913bfd3bf
-
Size
80KB
-
MD5
6cef783310b37e3c29c02679cb3f68f9
-
SHA1
a681ad578bd865fa5ee239c7f92965c9a40cffb8
-
SHA256
a06c899c395e67e8d9cf518b134cab0f77bdc50f8090ea40dd168c3913bfd3bf
-
SHA512
77b2b2e24e73328deee1000eb7ab6576c795eb33d29ffe49bb40e0bf44efb1a55800e919d840560d714ddc25358333abdbe8ad948c21565b7201ad2e92c5fdb3
-
SSDEEP
1536:UTOKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgQbHuS4VcTO9/r7UYdEJep:UaKpb8rGYrMPe3q7Q0XV5xtezEsi8/de
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-