General
-
Target
file (17).zip
-
Size
15KB
-
Sample
210224-9spycb7wtj
-
MD5
663662349134e7ce3eed0a56db009fac
-
SHA1
7850adc7ef04e304597f2f1c92392f752c84a91f
-
SHA256
46c52aea305057c75e7bb2537b535a3616071ea0887518ece70ef1f1e5fc0f1f
-
SHA512
3a76777096d1b35d2b1d39e54041c60726e21fe57f5d80ea247285d2462d6f1707037cf371e48a727afe899a0c684ac17c71fe6800ef234838fb83c2d7cf65bd
Behavioral task
behavioral1
Sample
document-1549008713.xls
Resource
win7v20201028
Behavioral task
behavioral2
Sample
document-1549008713.xls
Resource
win10v20201028
Malware Config
Extracted
http://31.214.157.170/22.gif
Targets
-
-
Target
document-1549008713.xls
-
Size
90KB
-
MD5
ff1cb95e9037762f726f9485db9eff12
-
SHA1
cfe3fdca0bc87f49788f75d872a56ed1842a02c5
-
SHA256
d64cc2ecc4cff3b0cd2d55dac173f57cb2dafd2e36e850c73b2c125197aca954
-
SHA512
b10677b6016699ce43f800c92360efc916649166cf0668f740abddf8b1c3e05bc29d53ae4dca2ffc40e9f977ff33b8a65e012c12b4383850647798176b9140ee
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-