General
-
Target
3b340212b863324ef8c0228aff6bcb6c008ce08160c31d02c3b18b362e4f0bff
-
Size
47KB
-
Sample
241120-zes1masdrc
-
MD5
0b96bcfb5376095b15ee29633feae05b
-
SHA1
94241c3bdc25b33d595ec38c2132be0ffc2d41a0
-
SHA256
3b340212b863324ef8c0228aff6bcb6c008ce08160c31d02c3b18b362e4f0bff
-
SHA512
b6841d24ff52cde810babf185c929657b727e205270f157c9413a44d2646053827e3cdc9a8e000b8d011f53feddc021228383fd178007332d70c0a92eabadfa2
-
SSDEEP
768:yDM52tfQXi8vgLZkTOHkQT51Vp6AwPdM8gQ6JOiX6DGwUk7qHDSEuRZjiBp5H:y62tfQXi8vgLZkTOHkQT51Vp6AwPe8gV
Behavioral task
behavioral1
Sample
3b340212b863324ef8c0228aff6bcb6c008ce08160c31d02c3b18b362e4f0bff.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3b340212b863324ef8c0228aff6bcb6c008ce08160c31d02c3b18b362e4f0bff.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://eleselektromekanik.com/69Iq5Pwbd0/s/
https://demo.icn.com.np/stories/Qk/
http://demo34.ckg.hk/service/Atk7RQfUV673M/
https://bitmovil.mx/css/TrgyPiTXy3/
http://dupot.cz/tvhost/DUnMUvwZOhQs/
http://focanainternet.com.br/erros/DepAK3p1Y/
Targets
-
-
Target
3b340212b863324ef8c0228aff6bcb6c008ce08160c31d02c3b18b362e4f0bff
-
Size
47KB
-
MD5
0b96bcfb5376095b15ee29633feae05b
-
SHA1
94241c3bdc25b33d595ec38c2132be0ffc2d41a0
-
SHA256
3b340212b863324ef8c0228aff6bcb6c008ce08160c31d02c3b18b362e4f0bff
-
SHA512
b6841d24ff52cde810babf185c929657b727e205270f157c9413a44d2646053827e3cdc9a8e000b8d011f53feddc021228383fd178007332d70c0a92eabadfa2
-
SSDEEP
768:yDM52tfQXi8vgLZkTOHkQT51Vp6AwPdM8gQ6JOiX6DGwUk7qHDSEuRZjiBp5H:y62tfQXi8vgLZkTOHkQT51Vp6AwPe8gV
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-