General
-
Target
f663c3bff1ac1034269ea51d5f01f982773e6e40ae397d8fb6c0fa4ae627181b
-
Size
43KB
-
Sample
241120-zb6sbaspgt
-
MD5
b793d76e9007e6e0cf92a6e7482c0311
-
SHA1
0c6b4ddbb49c8d0b4b6ef5bc97ffbc379c629002
-
SHA256
f663c3bff1ac1034269ea51d5f01f982773e6e40ae397d8fb6c0fa4ae627181b
-
SHA512
f60ecf70b7519e4eeaf3ec963855ce378284fdb52f3899b3546a86279c2676e4617802c8549a7e90c1cdb578b564df7f5d2b9d007521dee4b768b4f748713ab0
-
SSDEEP
768:cjkt9NNt50LUWnaLCIS8fEcTYn6SwsiN1xNOMG3s85sIv2Csqls5:c4pNt50LUWnaNHE9lZiNTEZ3XYz8Q
Behavioral task
behavioral1
Sample
County Payment Report - 2022-11-10_1226.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
County Payment Report - 2022-11-10_1226.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://www.vinyz.com/cache/rqWV/
http://yuanliao.raluking.com/1eq5o7/gHrTM8YilZz0quKt/
https://akarweb.net/cgi-bin/CL13tGXI/
http://www.bdbg.es/css/DDm7o71vWtTs/
Targets
-
-
Target
County Payment Report - 2022-11-10_1226.xls
-
Size
91KB
-
MD5
7c517fc0f713609f740d375ecfb33108
-
SHA1
736006fb5cc695be518b49bacc128bad5888e272
-
SHA256
3959e0f2ce9b4b6976ec5f51d95aa661c26000878daecf0e68803145d9f70b40
-
SHA512
0bbcf46e0b70e05f28994c1993f0ad7ceecc7c21a52587426adc569b7cb54d40408d85efc6ee2d3de97a3b6f1b71cedd899a5b80c64fe004f8355bfc15af70dc
-
SSDEEP
1536:eKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4bCXuZH4gb4CEn9J4ZjrX:eKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgs
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-