General
-
Target
SpaceX Starbase Invite.xlsm
-
Size
257KB
-
Sample
210308-8py8ckrj96
-
MD5
38dc747ed2bf525fead782fe6f574a00
-
SHA1
44cceb31b278afa3140c542a68729ead631cc9b5
-
SHA256
20b2ce41d0aaa9f142ca4e20060c91ec304f97f0579b62d906c009fc92f1af4e
-
SHA512
c467afee33999e9d0b152dfc026c1c38d2cde3031ee62aaf64e6c6513e8ee1d8a27825435ede7788ee0678fcbfc374c3c2c59e6e8fa106fa3c8dc20e3e228194
Static task
static1
Behavioral task
behavioral1
Sample
SpaceX Starbase Invite.xlsm
Resource
win7v20201028
Malware Config
Targets
-
-
Target
SpaceX Starbase Invite.xlsm
-
Size
257KB
-
MD5
38dc747ed2bf525fead782fe6f574a00
-
SHA1
44cceb31b278afa3140c542a68729ead631cc9b5
-
SHA256
20b2ce41d0aaa9f142ca4e20060c91ec304f97f0579b62d906c009fc92f1af4e
-
SHA512
c467afee33999e9d0b152dfc026c1c38d2cde3031ee62aaf64e6c6513e8ee1d8a27825435ede7788ee0678fcbfc374c3c2c59e6e8fa106fa3c8dc20e3e228194
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-