General
-
Target
0a19498bce5c91710ef60becb98aa026a8a57ced6926b6beac107186ebe3d05b
-
Size
70KB
-
Sample
241120-vgtbyszama
-
MD5
1cc5c85e99d6b8e4f1575bc313373b74
-
SHA1
1e83217834b1164dadf203cdf47d74024ca3d1d7
-
SHA256
0a19498bce5c91710ef60becb98aa026a8a57ced6926b6beac107186ebe3d05b
-
SHA512
6dc913d292994f7c8ca3a90b01708a8955b8a81b21bcde54e06e9bf3ab8c21b40bbb22b392e8531596504e0c85eeddacb63b9fbda8f7376df844ee710890750e
-
SSDEEP
1536:OhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+4+hDcnTLiQrRTZws8E1:uKpb8rGYrMPe3q7Q0XV5xtezE8vG8UMf
Behavioral task
behavioral1
Sample
0a19498bce5c91710ef60becb98aa026a8a57ced6926b6beac107186ebe3d05b.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0a19498bce5c91710ef60becb98aa026a8a57ced6926b6beac107186ebe3d05b.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://natayakim.com/_hlam/Ob78p6SxMNonofG/
http://weplug.com/dom/LfdeV8H4Zy1yLFRV/
http://martinmichalek.com/_sub/G1QKwEYPbt/
Targets
-
-
Target
0a19498bce5c91710ef60becb98aa026a8a57ced6926b6beac107186ebe3d05b
-
Size
70KB
-
MD5
1cc5c85e99d6b8e4f1575bc313373b74
-
SHA1
1e83217834b1164dadf203cdf47d74024ca3d1d7
-
SHA256
0a19498bce5c91710ef60becb98aa026a8a57ced6926b6beac107186ebe3d05b
-
SHA512
6dc913d292994f7c8ca3a90b01708a8955b8a81b21bcde54e06e9bf3ab8c21b40bbb22b392e8531596504e0c85eeddacb63b9fbda8f7376df844ee710890750e
-
SSDEEP
1536:OhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+4+hDcnTLiQrRTZws8E1:uKpb8rGYrMPe3q7Q0XV5xtezE8vG8UMf
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-