General
-
Target
ecc7d67a95a0bc100a6eebc60573de7ff556da84c43137adf9b23c6fbd5fb0d7
-
Size
142KB
-
Sample
241120-zlhs8ssrbw
-
MD5
cf35dd57ccc743ae5aef84255b30ef70
-
SHA1
0d39383fe20e21a41174191976386b1d93c51ddd
-
SHA256
ecc7d67a95a0bc100a6eebc60573de7ff556da84c43137adf9b23c6fbd5fb0d7
-
SHA512
c3c2652136fac4be4b3d8dcbf0e782379a17427e5758e1ae3bee12b86bd21b677c4e1ca366d2f923a2610d1212a45ef36e4a600eca38ad7e48b04fc73d92028b
-
SSDEEP
3072:4Rk3hbdlylKsgqopeJBWhZFGkE+cL2NdAlhEvN8B/W6X1yxYovrepMUdQ6gSz4iq:Qk3hbdlylKsgqopeJBWhZFVE+W2NdAli
Behavioral task
behavioral1
Sample
ecc7d67a95a0bc100a6eebc60573de7ff556da84c43137adf9b23c6fbd5fb0d7.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ecc7d67a95a0bc100a6eebc60573de7ff556da84c43137adf9b23c6fbd5fb0d7.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://185.7.214.7/fer/fer.html
Targets
-
-
Target
ecc7d67a95a0bc100a6eebc60573de7ff556da84c43137adf9b23c6fbd5fb0d7
-
Size
142KB
-
MD5
cf35dd57ccc743ae5aef84255b30ef70
-
SHA1
0d39383fe20e21a41174191976386b1d93c51ddd
-
SHA256
ecc7d67a95a0bc100a6eebc60573de7ff556da84c43137adf9b23c6fbd5fb0d7
-
SHA512
c3c2652136fac4be4b3d8dcbf0e782379a17427e5758e1ae3bee12b86bd21b677c4e1ca366d2f923a2610d1212a45ef36e4a600eca38ad7e48b04fc73d92028b
-
SSDEEP
3072:4Rk3hbdlylKsgqopeJBWhZFGkE+cL2NdAlhEvN8B/W6X1yxYovrepMUdQ6gSz4iq:Qk3hbdlylKsgqopeJBWhZFVE+W2NdAli
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-