General
-
Target
CompensationClaim-1190633265-11242020.xls
-
Size
61KB
-
Sample
201125-xp8a4g84rj
-
MD5
b66c611239f82ee9b04051591ddedcc9
-
SHA1
57d36b574cd37f069ffa513f533e31e7a12aa79b
-
SHA256
64f8921376f7e680cf53e889b99b418b6970a491b32305ce994ef919aef64445
-
SHA512
756cb685765abc96444d6b8f0b1891c25ba54690337066ac8d7bcd65c404ae4cf9b1bef8edc525c2da9674c8893b8a59f34faa8b7900e190541fc757b6e3dd9e
Static task
static1
Behavioral task
behavioral1
Sample
CompensationClaim-1190633265-11242020.xls
Resource
win7v20201028
Malware Config
Targets
-
-
Target
CompensationClaim-1190633265-11242020.xls
-
Size
61KB
-
MD5
b66c611239f82ee9b04051591ddedcc9
-
SHA1
57d36b574cd37f069ffa513f533e31e7a12aa79b
-
SHA256
64f8921376f7e680cf53e889b99b418b6970a491b32305ce994ef919aef64445
-
SHA512
756cb685765abc96444d6b8f0b1891c25ba54690337066ac8d7bcd65c404ae4cf9b1bef8edc525c2da9674c8893b8a59f34faa8b7900e190541fc757b6e3dd9e
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Loads dropped DLL
-