General
-
Target
54d6289b328d591f87df47b6141b34a51f9d9c93ec82532e1898f74895612e21
-
Size
96KB
-
Sample
241120-w3mlza1khz
-
MD5
c2b17630ce80dc179d4f8373b8378b12
-
SHA1
61949878a86175fa9be211cad79951114cb0a1ce
-
SHA256
54d6289b328d591f87df47b6141b34a51f9d9c93ec82532e1898f74895612e21
-
SHA512
9bc93855f60ea04da7e69241254943141d884c3a335fdd5ea0057abcd71d9149e2627320e174a532687d88a19a9d9431b68d9ad75a4a037c124acb5f368ffa58
-
SSDEEP
1536:WkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgEHuS4hcTO97v7UYdEJmW7:JKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgI
Behavioral task
behavioral1
Sample
54d6289b328d591f87df47b6141b34a51f9d9c93ec82532e1898f74895612e21.xls
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
54d6289b328d591f87df47b6141b34a51f9d9c93ec82532e1898f74895612e21.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://bpsjambi.id/about/CcN5IbuInPQ/
https://greenlizard.co.za/amanah/pu8xeUOpqqq/
https://akuntansi.itny.ac.id/asset/NH7qwRrn81Taa0VVqpx/
https://www.yell.ge/nav_logo/x960wo3PHaIUm/
Targets
-
-
Target
54d6289b328d591f87df47b6141b34a51f9d9c93ec82532e1898f74895612e21
-
Size
96KB
-
MD5
c2b17630ce80dc179d4f8373b8378b12
-
SHA1
61949878a86175fa9be211cad79951114cb0a1ce
-
SHA256
54d6289b328d591f87df47b6141b34a51f9d9c93ec82532e1898f74895612e21
-
SHA512
9bc93855f60ea04da7e69241254943141d884c3a335fdd5ea0057abcd71d9149e2627320e174a532687d88a19a9d9431b68d9ad75a4a037c124acb5f368ffa58
-
SSDEEP
1536:WkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgEHuS4hcTO97v7UYdEJmW7:JKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgI
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-