General
-
Target
Cancellation_Letter_1389392401-02242021.zip
-
Size
28KB
-
Sample
210225-a28ta9n2qj
-
MD5
63dccc05560dbcd7f5adc7876dcdc49c
-
SHA1
a09786e2fbf64bee71ac82cdd86b4662ef86fa06
-
SHA256
87a8737ea8c732ff3563b82232387ca5937f35abda81c8bef28998ecda5c8ea8
-
SHA512
093ad0ad894b6b0aded509b335d5bbc6c1807f0184f35044883a50bbcc70e9f7a0000ac18ebeac7be7c733e115624628cb70c9ac12442074f3a3dc0d0b27a751
Behavioral task
behavioral1
Sample
Cancellation_Letter_1389392401-02242021.xls
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Cancellation_Letter_1389392401-02242021.xls
Resource
win10v20201028
Malware Config
Extracted
http://slmtv.com/tfbgl/44252628012615700000.dat
http://dicomm-001-site35.ctempurl.com/pmslsda/44252628012615700000.dat
http://konyahaberler.xyz/hxjxxwav/44252628012615700000.dat
http://pandsquinny.com/nlbzyhfs/44252628012615700000.dat
http://www.kunjincompany.com/anesrq/44252628012615700000.dat
Targets
-
-
Target
Cancellation_Letter_1389392401-02242021.xls
-
Size
144KB
-
MD5
6a30fe578407419fa258c84b3d7c5614
-
SHA1
63938fdbdeb9686c5a1b9f377647b3684f4917ee
-
SHA256
e1cf1f8c3bb8f7db22d41062e109f835b8afe5384312b60002c702b419fd4c9c
-
SHA512
acca082c04b4e69ecf971ed275cd1412d7b46b8887d0484b309bd954550b42625786e3f9471dde64ed6badb6aed89bbfe37ee02017665acdba26d4644bf9db71
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-