General
-
Target
341a46578b652a45903b0c5540f32e39875bf9ee65b5d7902c5885013555859f
-
Size
95KB
-
Sample
241120-vdz1bszgnq
-
MD5
ab8135c30deb4ba84f5298190375de5f
-
SHA1
888ba7d577f058a89a1bcef4929ffe41803b63df
-
SHA256
341a46578b652a45903b0c5540f32e39875bf9ee65b5d7902c5885013555859f
-
SHA512
e5a5a52e0a2c40b1cda10cfbc9984e5b3139be5a243814f54e24810140310f1255dd837496992a13b13676ae90cac448d6cf9667f2e6240685c3689876442cdc
-
SSDEEP
1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgNHuS4hcTO97v7UYdEJmJ:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgc
Behavioral task
behavioral1
Sample
341a46578b652a45903b0c5540f32e39875bf9ee65b5d7902c5885013555859f.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
341a46578b652a45903b0c5540f32e39875bf9ee65b5d7902c5885013555859f.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://fikti.bem.gunadarma.ac.id/SDM/YH8OJ1Zz8miBX/
http://ebuysa.co.za/yt-assets/yZ30/
http://3dstudioa.com.br/files/1ubPAB/
http://boardmart.co.za/images/DvMHPbTLn/
Targets
-
-
Target
341a46578b652a45903b0c5540f32e39875bf9ee65b5d7902c5885013555859f
-
Size
95KB
-
MD5
ab8135c30deb4ba84f5298190375de5f
-
SHA1
888ba7d577f058a89a1bcef4929ffe41803b63df
-
SHA256
341a46578b652a45903b0c5540f32e39875bf9ee65b5d7902c5885013555859f
-
SHA512
e5a5a52e0a2c40b1cda10cfbc9984e5b3139be5a243814f54e24810140310f1255dd837496992a13b13676ae90cac448d6cf9667f2e6240685c3689876442cdc
-
SSDEEP
1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgNHuS4hcTO97v7UYdEJmJ:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgc
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-