General
-
Target
Inf-855.xls
-
Size
31KB
-
Sample
201217-fl25lwqv5n
-
MD5
7c7dfa4acc8c7767eded7450a434a355
-
SHA1
2ee1b3d1376ca3c953fcf2385a478367be408b25
-
SHA256
c94ac6548943c1f9a85ed599a81ce7fefa81092ee7ad9cce48b3d46a522a9773
-
SHA512
4c2d9ef6374a9d98c1c0608ef0c1d73a41a3bcac917a7320d0f051dabf9a732dd2efc1cd0299599918d81f59223c5c6003e9153bc89c1c661618dcffd0b2dd6b
Static task
static1
Behavioral task
behavioral1
Sample
Inf-855.xls
Resource
win7v20201028
Malware Config
Extracted
https://mobitel-servis.si/vendor.php
https://leadingpips.com/crypt.php
Targets
-
-
Target
Inf-855.xls
-
Size
31KB
-
MD5
7c7dfa4acc8c7767eded7450a434a355
-
SHA1
2ee1b3d1376ca3c953fcf2385a478367be408b25
-
SHA256
c94ac6548943c1f9a85ed599a81ce7fefa81092ee7ad9cce48b3d46a522a9773
-
SHA512
4c2d9ef6374a9d98c1c0608ef0c1d73a41a3bcac917a7320d0f051dabf9a732dd2efc1cd0299599918d81f59223c5c6003e9153bc89c1c661618dcffd0b2dd6b
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-