General
-
Target
64a0ce36b89c57c196caa4e8cb6f8be6fbccb4a66e7d5f32260aeab9d1d32c04
-
Size
76KB
-
Sample
241120-zssl1stjd1
-
MD5
0afc258310d09e92454c3679dc9d5298
-
SHA1
f3ad63f18b438dc13b0a071027ad0369ee3f3f97
-
SHA256
64a0ce36b89c57c196caa4e8cb6f8be6fbccb4a66e7d5f32260aeab9d1d32c04
-
SHA512
d39a39f9e1e35f52ce11039ecd4f6f26e05ba816d5430b1a376f8fb3df31a57f21246ea571ab25b0a2962ec285e87cdbe57eed4488166887c7854d1984ecb1ec
-
SSDEEP
1536:1I+Hymsbck3hbdlylKsgqopeJBWhZFGkE+cMLxAAISQ5gQ72IotO6nitSU6U+x:1I+HymsYk3hbdlylKsgqopeJBWhZFGkz
Behavioral task
behavioral1
Sample
64a0ce36b89c57c196caa4e8cb6f8be6fbccb4a66e7d5f32260aeab9d1d32c04.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
64a0ce36b89c57c196caa4e8cb6f8be6fbccb4a66e7d5f32260aeab9d1d32c04.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://91.240.118.168/zzx/ccv/fe.html
Targets
-
-
Target
64a0ce36b89c57c196caa4e8cb6f8be6fbccb4a66e7d5f32260aeab9d1d32c04
-
Size
76KB
-
MD5
0afc258310d09e92454c3679dc9d5298
-
SHA1
f3ad63f18b438dc13b0a071027ad0369ee3f3f97
-
SHA256
64a0ce36b89c57c196caa4e8cb6f8be6fbccb4a66e7d5f32260aeab9d1d32c04
-
SHA512
d39a39f9e1e35f52ce11039ecd4f6f26e05ba816d5430b1a376f8fb3df31a57f21246ea571ab25b0a2962ec285e87cdbe57eed4488166887c7854d1984ecb1ec
-
SSDEEP
1536:1I+Hymsbck3hbdlylKsgqopeJBWhZFGkE+cMLxAAISQ5gQ72IotO6nitSU6U+x:1I+HymsYk3hbdlylKsgqopeJBWhZFGkz
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-