General
-
Target
Order-13822.xls
-
Size
111KB
-
Sample
201217-wjvrnjhlg6
-
MD5
ee70031efbe62f81aa3c434ae0636a09
-
SHA1
a9ebd7146771b922cb9a21456566fce7e93919c0
-
SHA256
147679b401d295a5300cde9e2ad39a1a2b5a09757c1a248dd53914bdb9678140
-
SHA512
9f3dfee086cf585601002d449613c34295e5e5fdad29bd41750e96011c2073d8e923109ebdf490d52b3c658174f3b7e0f6f2f47f5a64e63a40ded6d30b84adc4
Static task
static1
Behavioral task
behavioral1
Sample
Order-13822.xls
Resource
win7v20201028
Malware Config
Extracted
https://reinin.tw/wp-keys.php
https://legendcoder.com/wp-keys.php
https://pullingmezcnarcmer.tk/wp-keys.php
https://ruibrunconcallconsta.tk/wp-keys.php
Targets
-
-
Target
Order-13822.xls
-
Size
111KB
-
MD5
ee70031efbe62f81aa3c434ae0636a09
-
SHA1
a9ebd7146771b922cb9a21456566fce7e93919c0
-
SHA256
147679b401d295a5300cde9e2ad39a1a2b5a09757c1a248dd53914bdb9678140
-
SHA512
9f3dfee086cf585601002d449613c34295e5e5fdad29bd41750e96011c2073d8e923109ebdf490d52b3c658174f3b7e0f6f2f47f5a64e63a40ded6d30b84adc4
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-