General
-
Target
this_challenge (18).zip
-
Size
15KB
-
Sample
210225-xn78vp8w5a
-
MD5
5f2a6a2ace3b147206781f71834a7c1d
-
SHA1
2672433e469f1762724356b368e43108d95fd949
-
SHA256
7a10acd0c776d83e34caec62b139942f95430e4e2639227b211f8584d62f2aa4
-
SHA512
9516ff6b57fdb96530f970359e6b6c6e454bdee7ca32350152e8eab9ed1fdcbdd79580c9a4f4a5a28415912938dc7250fb0aac45a44bd9e1e4db0306f27c54ec
Behavioral task
behavioral1
Sample
document-1040505314.xls
Resource
win7v20201028
Behavioral task
behavioral2
Sample
document-1040505314.xls
Resource
win10v20201028
Malware Config
Extracted
http://fb25d3a23hy.com/fb26.gif
Targets
-
-
Target
document-1040505314.xls
-
Size
88KB
-
MD5
5d45d65e828f70f102ad6031d7ecbcbe
-
SHA1
10b4b537cf7bce190d98c7379251979ce8b39358
-
SHA256
d07a55e344783ea610fb98a8b66cf4c4c00083c1442971550ca685ce3b95a4d2
-
SHA512
dbb1ebeced187bdd2fd22827d0ed42a3e7798f874ca2597b9140cb9a35d6e7df0c37be4c0f7d6356597174483337b32623b472010b4d6851aa71d272cd16d821
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-