General
-
Target
SecuriteInfo.com.VB.Heur2.EmoDldr.16.13971CEE.Gen.7989.21486
-
Size
244KB
-
Sample
210309-xgc3fj4bas
-
MD5
465073cff94c47ab863e5e9a5822c35d
-
SHA1
be9cb1aa91056bbb4d9b8ad82b43ffdb85dbe36a
-
SHA256
749f0d02e40de3105c7086ae9073dd71ea494ab873cc1b32bc4ae25ac72d892e
-
SHA512
d11e4095a55b7388635b7eaf0bba3295a7d70ffa9d57b255ba97244c63952aa802adf95cf4fad6c44530b8c83cd2def1959ff4a7b722bbc27a170e3c187df650
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.VB.Heur2.EmoDldr.16.13971CEE.Gen.7989.21486.xlsm
Resource
win7v20201028
Behavioral task
behavioral2
Sample
SecuriteInfo.com.VB.Heur2.EmoDldr.16.13971CEE.Gen.7989.21486.xlsm
Resource
win10v20201028
Malware Config
Targets
-
-
Target
SecuriteInfo.com.VB.Heur2.EmoDldr.16.13971CEE.Gen.7989.21486
-
Size
244KB
-
MD5
465073cff94c47ab863e5e9a5822c35d
-
SHA1
be9cb1aa91056bbb4d9b8ad82b43ffdb85dbe36a
-
SHA256
749f0d02e40de3105c7086ae9073dd71ea494ab873cc1b32bc4ae25ac72d892e
-
SHA512
d11e4095a55b7388635b7eaf0bba3295a7d70ffa9d57b255ba97244c63952aa802adf95cf4fad6c44530b8c83cd2def1959ff4a7b722bbc27a170e3c187df650
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-