General
-
Target
bid_05.20.doc
-
Size
93KB
-
Sample
200522-gl21s88ymx
-
MD5
c20c9b35bb637f123e13d76b9856be94
-
SHA1
b5d2640247e6ef9424741cf2cfd47f9b837f252a
-
SHA256
d506a7e9111252495ae25542a3dcc2d0a142447e2499b191bd76098f0f32859c
-
SHA512
03365c04e0e09d02fe6cd6fa41e68eab9c50878f29f8b2f74c93773abc207d765069183476d33d800141f8e4398558a57f639cfd0d2674465e09ae80121856fe
Static task
static1
Behavioral task
behavioral1
Sample
bid_05.20.doc
Resource
win7v200430
Behavioral task
behavioral2
Sample
bid_05.20.doc
Resource
win10v200430
Malware Config
Targets
-
-
Target
bid_05.20.doc
-
Size
93KB
-
MD5
c20c9b35bb637f123e13d76b9856be94
-
SHA1
b5d2640247e6ef9424741cf2cfd47f9b837f252a
-
SHA256
d506a7e9111252495ae25542a3dcc2d0a142447e2499b191bd76098f0f32859c
-
SHA512
03365c04e0e09d02fe6cd6fa41e68eab9c50878f29f8b2f74c93773abc207d765069183476d33d800141f8e4398558a57f639cfd0d2674465e09ae80121856fe
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Loads dropped DLL
-