General
-
Target
papers (71).xls
-
Size
318KB
-
Sample
210225-9jlcywdgz2
-
MD5
540499ef024a652fea8780e11398f03c
-
SHA1
33da766338fa9fd840b1f43a6330a0af8cfa0a39
-
SHA256
8dfff9a2ff5cb2b8d70cf43fd0dc7a521570105d623cf28b76f8c66a9a664dd6
-
SHA512
63758c69b8315b2dd1944451b614b459298bc1ce2aa3468f46aba58a5008f1c05457f528cabe2fdbdf19d0e90697eb34f80acb778fe5d6560c7ec672b117c144
Behavioral task
behavioral1
Sample
papers (71).xls
Resource
win7v20201028
Behavioral task
behavioral2
Sample
papers (71).xls
Resource
win10v20201028
Malware Config
Extracted
https://remedial.aaua.edu.ng/ds/1502.gif
Targets
-
-
Target
papers (71).xls
-
Size
318KB
-
MD5
540499ef024a652fea8780e11398f03c
-
SHA1
33da766338fa9fd840b1f43a6330a0af8cfa0a39
-
SHA256
8dfff9a2ff5cb2b8d70cf43fd0dc7a521570105d623cf28b76f8c66a9a664dd6
-
SHA512
63758c69b8315b2dd1944451b614b459298bc1ce2aa3468f46aba58a5008f1c05457f528cabe2fdbdf19d0e90697eb34f80acb778fe5d6560c7ec672b117c144
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-