General
-
Target
İşlem makbuzu.xls
-
Size
1.2MB
-
Sample
200714-q5gbzphyhj
-
MD5
e1ad40565ca903516bd05ba7fda11572
-
SHA1
37da3e979b21cf1cfce1caf621e87e4976d85c39
-
SHA256
bc931d7664aeaef451ee7a596031259b24fc48772e624e2d7bf0e18c094551ef
-
SHA512
ac66861c96ee0608e4a931121f0edf9bd89937998d0899711f4385c8a33b0b6535643f3000da063bd8cfdd6c1f5826a7e632ca00085e3fdbd73b25622da4b4b4
Static task
static1
Behavioral task
behavioral1
Sample
İşlem makbuzu.xls
Resource
win7
Behavioral task
behavioral2
Sample
İşlem makbuzu.xls
Resource
win10v200430
Malware Config
Extracted
http://ahjuric.si/Code.txt
Targets
-
-
Target
İşlem makbuzu.xls
-
Size
1.2MB
-
MD5
e1ad40565ca903516bd05ba7fda11572
-
SHA1
37da3e979b21cf1cfce1caf621e87e4976d85c39
-
SHA256
bc931d7664aeaef451ee7a596031259b24fc48772e624e2d7bf0e18c094551ef
-
SHA512
ac66861c96ee0608e4a931121f0edf9bd89937998d0899711f4385c8a33b0b6535643f3000da063bd8cfdd6c1f5826a7e632ca00085e3fdbd73b25622da4b4b4
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blacklisted process makes network request
-