General
-
Target
4df811184804a69909d21aa8a20da6902590c2871fdf84d2290f6b911448c365
-
Size
80KB
-
Sample
241120-vcrbsstral
-
MD5
18a6679b90020130d8b2da431882471c
-
SHA1
24a1e6dfbbfbbc6253e62d18ece87e51c6d537b7
-
SHA256
4df811184804a69909d21aa8a20da6902590c2871fdf84d2290f6b911448c365
-
SHA512
d27f40e8bf6db767a77c860e396003891e81edda61ffe9bdde05e3a8003080b256e7785ad32efd5ca6ee52789da635510e44a8d539bc3c2720053de1a1a78a89
-
SSDEEP
1536:ROOKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgG7HuS4VcTO9/r7UYdEJeZ:RBKpb8rGYrMPe3q7Q0XV5xtezEsi8/dE
Behavioral task
behavioral1
Sample
4df811184804a69909d21aa8a20da6902590c2871fdf84d2290f6b911448c365.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4df811184804a69909d21aa8a20da6902590c2871fdf84d2290f6b911448c365.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://centaurussits.com/assets/FL/
http://cansal.cl/cgi-bin/besSIJTfOk0DtHZR/
http://chalkie.me.uk/cgi-bin/gMLuebzG2RskkJXwY/
http://www.cecambrils.cat/wp-content/0KwOSfNDESlzVMoc/
Targets
-
-
Target
4df811184804a69909d21aa8a20da6902590c2871fdf84d2290f6b911448c365
-
Size
80KB
-
MD5
18a6679b90020130d8b2da431882471c
-
SHA1
24a1e6dfbbfbbc6253e62d18ece87e51c6d537b7
-
SHA256
4df811184804a69909d21aa8a20da6902590c2871fdf84d2290f6b911448c365
-
SHA512
d27f40e8bf6db767a77c860e396003891e81edda61ffe9bdde05e3a8003080b256e7785ad32efd5ca6ee52789da635510e44a8d539bc3c2720053de1a1a78a89
-
SSDEEP
1536:ROOKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgG7HuS4VcTO9/r7UYdEJeZ:RBKpb8rGYrMPe3q7Q0XV5xtezEsi8/dE
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-