General
-
Target
8272133.xlsb
-
Size
84KB
-
Sample
201027-xsnh8cl69j
-
MD5
6df494468bdd94b1748fc514bbfdf784
-
SHA1
d7e2ae2fea1f1bbf8f677f431bd98a39c4bc8039
-
SHA256
5b8a82fc7209d40dff72c6e53a9cd35f66f2eef949e6cc84c5f24049a1b12a80
-
SHA512
86fd1323fcb150bf0b85a221d5f5f29d576dfd00b609a34323149c0e4469697ee4226208332311513457186fbb1d94cd5fb6fc5627e8b4a8969b77de31a541e1
Static task
static1
Behavioral task
behavioral1
Sample
8272133.xlsb
Resource
win7
Behavioral task
behavioral2
Sample
8272133.xlsb
Resource
win10
Malware Config
Targets
-
-
Target
8272133.xlsb
-
Size
84KB
-
MD5
6df494468bdd94b1748fc514bbfdf784
-
SHA1
d7e2ae2fea1f1bbf8f677f431bd98a39c4bc8039
-
SHA256
5b8a82fc7209d40dff72c6e53a9cd35f66f2eef949e6cc84c5f24049a1b12a80
-
SHA512
86fd1323fcb150bf0b85a221d5f5f29d576dfd00b609a34323149c0e4469697ee4226208332311513457186fbb1d94cd5fb6fc5627e8b4a8969b77de31a541e1
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blacklisted process makes network request
-
Loads dropped DLL
-