General
-
Target
SpaceX Starbase Invite.xlsm
-
Size
253KB
-
Sample
210308-q97m1efah6
-
MD5
5fd44b5a1abea3f880bfa3e32b0dda43
-
SHA1
835621322f1ee6cb637c94d50efa7f704bd4b650
-
SHA256
cf143b7f45179622dce93a753765349436506ac2b035c007b1699ba1490a31c9
-
SHA512
b04e88dbde0aa441bd0d17871cd9c85e22b934bbefcb69a52d6016274d2fecfb69553b2c41610bdd470d91d0c8167c59d562814a398d1948056d4897a9cdcd08
Static task
static1
Behavioral task
behavioral1
Sample
SpaceX Starbase Invite.xlsm
Resource
win7v20201028
Behavioral task
behavioral2
Sample
SpaceX Starbase Invite.xlsm
Resource
win10v20201028
Malware Config
Targets
-
-
Target
SpaceX Starbase Invite.xlsm
-
Size
253KB
-
MD5
5fd44b5a1abea3f880bfa3e32b0dda43
-
SHA1
835621322f1ee6cb637c94d50efa7f704bd4b650
-
SHA256
cf143b7f45179622dce93a753765349436506ac2b035c007b1699ba1490a31c9
-
SHA512
b04e88dbde0aa441bd0d17871cd9c85e22b934bbefcb69a52d6016274d2fecfb69553b2c41610bdd470d91d0c8167c59d562814a398d1948056d4897a9cdcd08
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-