General
-
Target
ckJTQEOKC.zip
-
Size
20KB
-
Sample
241129-m68tyawrhm
-
MD5
a8fd65d74a9739b23c7e364df251b4e5
-
SHA1
fe8d2606f65a2cf08213786576ecfb20e4e6eba3
-
SHA256
32f821e84b91cdd2e998be739eb5b9d2e435827b4be84c54be34ce44a6e2ec31
-
SHA512
27632f81f83491ca628b0210a9eb28bbbda30a718596eb8e216417f8467e971d9bdc6ede3af7163ea5524fc780722b5e1d3eb6fa4eb69c9284789b7d13727ac4
-
SSDEEP
384:CuInQrtM9vrxKnB4AvyszfOiSr+p51d74AwsN3V/oQkUYP4ZqkqTZNLFzNF:ung8jEOAtOtw5v8ATJVFny4zqTZtFzP
Static task
static1
Malware Config
Targets
-
-
Target
ckJTQEOKC.zip
-
Size
20KB
-
MD5
a8fd65d74a9739b23c7e364df251b4e5
-
SHA1
fe8d2606f65a2cf08213786576ecfb20e4e6eba3
-
SHA256
32f821e84b91cdd2e998be739eb5b9d2e435827b4be84c54be34ce44a6e2ec31
-
SHA512
27632f81f83491ca628b0210a9eb28bbbda30a718596eb8e216417f8467e971d9bdc6ede3af7163ea5524fc780722b5e1d3eb6fa4eb69c9284789b7d13727ac4
-
SSDEEP
384:CuInQrtM9vrxKnB4AvyszfOiSr+p51d74AwsN3V/oQkUYP4ZqkqTZNLFzNF:ung8jEOAtOtw5v8ATJVFny4zqTZtFzP
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Download via BitsAdmin
-
Drops file in System32 directory
-