General
-
Target
INV-1581.doc
-
Size
149KB
-
Sample
210306-pygqllkph2
-
MD5
470b5f77bd00e2002939833ab72ad47a
-
SHA1
540fb80aae64faccbb47ced4d4ec57448ca4297e
-
SHA256
7df11aa42a30d550a3fba77ed9fc353108f4cac53a2dac6f29a6534dd0ecbd06
-
SHA512
69a569c079bf78693d751d3834f94888de5f3276b69d9eb63c09bec678335dbb0740337d87646ea26325851d2e4754c881d7c7512520d5831468bc07a84f6b55
Static task
static1
Behavioral task
behavioral1
Sample
INV-1581.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
INV-1581.doc
Resource
win10v20201028
Malware Config
Targets
-
-
Target
INV-1581.doc
-
Size
149KB
-
MD5
470b5f77bd00e2002939833ab72ad47a
-
SHA1
540fb80aae64faccbb47ced4d4ec57448ca4297e
-
SHA256
7df11aa42a30d550a3fba77ed9fc353108f4cac53a2dac6f29a6534dd0ecbd06
-
SHA512
69a569c079bf78693d751d3834f94888de5f3276b69d9eb63c09bec678335dbb0740337d87646ea26325851d2e4754c881d7c7512520d5831468bc07a84f6b55
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-