General
-
Target
Attachment_65307.xlsb
-
Size
106KB
-
Sample
210212-4kxvgclptx
-
MD5
3827cfd0b93d8d87c434a774782e434a
-
SHA1
1aff5b6db02cb808b41216e4bc4aeed1ef63b4d5
-
SHA256
4513c7bf3eba413e076d4e091bd3d88284644f2f051b9ebfdd537f982ddd6e61
-
SHA512
6e7bee5ba20655dcfd561db2c18409c7b72d8b84526efcff36a116565441922a880bfda071f24127cac43289c9ece12a98ff23d31ef91912e50c6d148f9e792b
Behavioral task
behavioral1
Sample
Attachment_65307.xlsb
Resource
win10v20201028
Malware Config
Targets
-
-
Target
Attachment_65307.xlsb
-
Size
106KB
-
MD5
3827cfd0b93d8d87c434a774782e434a
-
SHA1
1aff5b6db02cb808b41216e4bc4aeed1ef63b4d5
-
SHA256
4513c7bf3eba413e076d4e091bd3d88284644f2f051b9ebfdd537f982ddd6e61
-
SHA512
6e7bee5ba20655dcfd561db2c18409c7b72d8b84526efcff36a116565441922a880bfda071f24127cac43289c9ece12a98ff23d31ef91912e50c6d148f9e792b
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-