General
-
Target
SpaceX Starbase Invite.xlsm
-
Size
240KB
-
Sample
210309-eqqcmrl2rs
-
MD5
c203a4725a47fe34b5811a122d45733e
-
SHA1
6c39c1922d4f2c5b50d8431ec1b61e73b7d2731f
-
SHA256
99bd5914039d840274690ce7223d6504d72724a3eb55dd4dfce6de855b989174
-
SHA512
28b619c7ff7fd25f01a5231930c9913498c9e47056683cf98464fd48b938782c48e64f26f35401573031319da3d9f20543a61774c86710a5e3449b88063175f3
Static task
static1
Behavioral task
behavioral1
Sample
SpaceX Starbase Invite.xlsm
Resource
win7v20201028
Behavioral task
behavioral2
Sample
SpaceX Starbase Invite.xlsm
Resource
win10v20201028
Malware Config
Targets
-
-
Target
SpaceX Starbase Invite.xlsm
-
Size
240KB
-
MD5
c203a4725a47fe34b5811a122d45733e
-
SHA1
6c39c1922d4f2c5b50d8431ec1b61e73b7d2731f
-
SHA256
99bd5914039d840274690ce7223d6504d72724a3eb55dd4dfce6de855b989174
-
SHA512
28b619c7ff7fd25f01a5231930c9913498c9e47056683cf98464fd48b938782c48e64f26f35401573031319da3d9f20543a61774c86710a5e3449b88063175f3
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-