General
-
Target
tell_05.27.2020.doc
-
Size
73KB
-
Sample
200529-w91r3jxd4x
-
MD5
5144d81649f2d8fffbe01a0e59504714
-
SHA1
5c06328d3d81f48ea3786ae863abf3d9b2b99de1
-
SHA256
b787ee7e274f352c5981eaa77aa60a305220e3a831442c46f154ac7299321beb
-
SHA512
6e0a9a01417e8fa7c8a707252ce2e75300a7d05d558f508a2594c7c217ab52bf730b432eda1f29232d42c527a8df6bab240f0901b175b2e5c6c4718712dd50c4
Static task
static1
Behavioral task
behavioral1
Sample
tell_05.27.2020.doc
Resource
win7v200430
Behavioral task
behavioral2
Sample
tell_05.27.2020.doc
Resource
win10v200430
Malware Config
Targets
-
-
Target
tell_05.27.2020.doc
-
Size
73KB
-
MD5
5144d81649f2d8fffbe01a0e59504714
-
SHA1
5c06328d3d81f48ea3786ae863abf3d9b2b99de1
-
SHA256
b787ee7e274f352c5981eaa77aa60a305220e3a831442c46f154ac7299321beb
-
SHA512
6e0a9a01417e8fa7c8a707252ce2e75300a7d05d558f508a2594c7c217ab52bf730b432eda1f29232d42c527a8df6bab240f0901b175b2e5c6c4718712dd50c4
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-