General

  • Target

    payment_752.xls

  • Size

    148KB

  • Sample

    200707-qdvryfszws

  • MD5

    8e27f25d7c56eb111e6e60b735562ce5

  • SHA1

    ea8aa1d15c8c3a480ca553c9c514256d6b0a5c95

  • SHA256

    5ed3ae3b34dc28e9f04dbc880a62a3595f3ac6f5c8d133917f15a98b17f121fc

  • SHA512

    a4335f5f25bbbc4005f638536936280eba51e21239dada04b76edc12ab40dc3ceacf60c56cd899280fd3eb79c46761f2cd209a5b8b46c1932c00661dc9ee3cca

Score
10/10

Malware Config

Targets

    • Target

      payment_752.xls

    • Size

      148KB

    • MD5

      8e27f25d7c56eb111e6e60b735562ce5

    • SHA1

      ea8aa1d15c8c3a480ca553c9c514256d6b0a5c95

    • SHA256

      5ed3ae3b34dc28e9f04dbc880a62a3595f3ac6f5c8d133917f15a98b17f121fc

    • SHA512

      a4335f5f25bbbc4005f638536936280eba51e21239dada04b76edc12ab40dc3ceacf60c56cd899280fd3eb79c46761f2cd209a5b8b46c1932c00661dc9ee3cca

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v6

Tasks