General
-
Target
0a73805c5e818514004fc8df6d731d2357647c7685234dba6cff3ef8d22f5b07
-
Size
61KB
-
Sample
241120-xtqspsscqq
-
MD5
579c5628211b5a8c97c8a0a1ae3b4c07
-
SHA1
42e28e071054b879720158e2590247be176c0498
-
SHA256
0a73805c5e818514004fc8df6d731d2357647c7685234dba6cff3ef8d22f5b07
-
SHA512
696b911c53c45554369a65d4730874a437861782357f267ba6cb6546a2f7b9256d33d514c4d042c270a8cd064fa00b62442c276287072d068ce5dc8792bbf9d9
-
SSDEEP
1536:Y3df8V59Mm0F7GNolPlsiPjBhmbLhAVo8vuazGE08ATl:Yg/u6NolKq+xr82V8ATl
Behavioral task
behavioral1
Sample
b114281a6664f44018353cae8a6f00cea1d34854e2942f01a9e027d2ab333b9d.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b114281a6664f44018353cae8a6f00cea1d34854e2942f01a9e027d2ab333b9d.doc
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://geevida.com/wp-admin/DhWo/
http://elrofanfoods.com/wp-admin/qc/
https://volcanict.com/wp-admin/LfWFF/
http://xmjadever.com/wp-admin/FTOXI/
https://gbmcleaning.com/1/Gdk5eqv/
https://kingchuen.com/cgi-bin/KQ/
https://billc46.com/uf65/H4/
Targets
-
-
Target
b114281a6664f44018353cae8a6f00cea1d34854e2942f01a9e027d2ab333b9d
-
Size
170KB
-
MD5
e76976972a1c472103da35a58f2b7e20
-
SHA1
13741661f6dd60c885900e9d1f1a8534df9f5cda
-
SHA256
b114281a6664f44018353cae8a6f00cea1d34854e2942f01a9e027d2ab333b9d
-
SHA512
e0fb97de3761f8359d757ad99ebfb88242d9dc571516f24247c5c0572e9b5e376554aea65628379b5f271fac539efef57c96c0f9593506497a88f6a2a0435a05
-
SSDEEP
1536:AGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xiP340Vzy7dUWqHe43d9T96aEH5is:yrfrzOH98ipgWPLQSq/1
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-