General
-
Target
Potwierdzenie_transakcji.xls
-
Size
858KB
-
Sample
200714-92x3wket86
-
MD5
473a9bfb649e3a6bf4341d35b839005a
-
SHA1
f872b68d9d4ba900481c45662b9c8fe3f9006ec6
-
SHA256
960682168b2d6bc4518726721741593c127da6787aa2ca768bc31734b5c72579
-
SHA512
057bb39550bd809aa1235cdbbd457d7bf304088f9442bddf5e2610f498986b880872eac247f5810e7feec32b38b40193309a1b6fce43e2a59ae8a945cffc64dc
Static task
static1
Behavioral task
behavioral1
Sample
Potwierdzenie_transakcji.xls
Resource
win7v200430
Malware Config
Extracted
http://office-service-softs.info/tech.jpg
Targets
-
-
Target
Potwierdzenie_transakcji.xls
-
Size
858KB
-
MD5
473a9bfb649e3a6bf4341d35b839005a
-
SHA1
f872b68d9d4ba900481c45662b9c8fe3f9006ec6
-
SHA256
960682168b2d6bc4518726721741593c127da6787aa2ca768bc31734b5c72579
-
SHA512
057bb39550bd809aa1235cdbbd457d7bf304088f9442bddf5e2610f498986b880872eac247f5810e7feec32b38b40193309a1b6fce43e2a59ae8a945cffc64dc
-
NetWire RAT payload
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blacklisted process makes network request
-
Suspicious use of SetThreadContext
-