General
-
Target
241b198d22c1ddff730ef8acab9e595b1fc0e5fb7801b09d9dbbb81ce875121a
-
Size
88KB
-
Sample
241120-zyandsxqhr
-
MD5
6929e695a4a04b82e1cd89121d75e93b
-
SHA1
ca5639691f1501da0d50fd4cf7c0d82e5e3b51e6
-
SHA256
241b198d22c1ddff730ef8acab9e595b1fc0e5fb7801b09d9dbbb81ce875121a
-
SHA512
dbcfa9b52c1fd634ace7dc23fe8a34fe41080ac8cd67a98c544bd8a7998808a0ac9f6106a367c1cceeff858063c14b863423d1a34dcf84cb57e2f13587f4829c
-
SSDEEP
1536:Fyehv7q2Pjx45uoDGTj+5xtekEvi8/dgL8EsAeE9jbDXQAzkWvgrPE4nWHPNc2AF:Fyehv7q2Pjx45uoDGTj+5xtekEvi8/db
Behavioral task
behavioral1
Sample
241b198d22c1ddff730ef8acab9e595b1fc0e5fb7801b09d9dbbb81ce875121a.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
241b198d22c1ddff730ef8acab9e595b1fc0e5fb7801b09d9dbbb81ce875121a.xls
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://wearsweetbomb.com/wp-content/15zZybP1EXttxDK4JH/
https://1566xueshe.com/wp-includes/z92ZVqHH8/
http://mymicrogreen.mightcode.com/Fox-C/NWssAbNOJDxhs/
http://o2omart.co.in/infructuose/m4mgt2MeU/
http://mtc.joburg.org.za/-/GBGJeFxXWlNbABv2/
http://www.ama.cu/jpr/VVP/
http://actividades.laforetlanguages.com/wp-admin/dU8Ds/
https://dwwmaster.com/wp-content/1sR2HfFxQnkWuu/
https://edu-media.cn/wp-admin/0JAE/
https://iacademygroup.cl/office/G42LJPLkl/
https://znzhou.top/mode/0Qb/
Targets
-
-
Target
241b198d22c1ddff730ef8acab9e595b1fc0e5fb7801b09d9dbbb81ce875121a
-
Size
88KB
-
MD5
6929e695a4a04b82e1cd89121d75e93b
-
SHA1
ca5639691f1501da0d50fd4cf7c0d82e5e3b51e6
-
SHA256
241b198d22c1ddff730ef8acab9e595b1fc0e5fb7801b09d9dbbb81ce875121a
-
SHA512
dbcfa9b52c1fd634ace7dc23fe8a34fe41080ac8cd67a98c544bd8a7998808a0ac9f6106a367c1cceeff858063c14b863423d1a34dcf84cb57e2f13587f4829c
-
SSDEEP
1536:Fyehv7q2Pjx45uoDGTj+5xtekEvi8/dgL8EsAeE9jbDXQAzkWvgrPE4nWHPNc2AF:Fyehv7q2Pjx45uoDGTj+5xtekEvi8/db
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-