General
-
Target
SpaceX Starbase Invite.xlsm
-
Size
242KB
-
Sample
210310-lxvshhg6w6
-
MD5
3f8ea86cf6cf87e687b31a59e087dd7f
-
SHA1
ef9e0e5ac5ede2626db2bc9c0683200fc8a4813a
-
SHA256
373f30874b0bf0abdd58ab6b4fe7f1001c651dd1336649dff47b0d877a4afb5e
-
SHA512
a5b9c682fa1f8172c755a09620df394b3dbfca0e3d39eac2fd2edc08b065f7dc3405eee98c4a570301086cd1ae48586c67f6dc7603bef37d39a40dcdd4f82451
Static task
static1
Behavioral task
behavioral1
Sample
SpaceX Starbase Invite.xlsm
Resource
win7v20201028
Behavioral task
behavioral2
Sample
SpaceX Starbase Invite.xlsm
Resource
win10v20201028
Malware Config
Targets
-
-
Target
SpaceX Starbase Invite.xlsm
-
Size
242KB
-
MD5
3f8ea86cf6cf87e687b31a59e087dd7f
-
SHA1
ef9e0e5ac5ede2626db2bc9c0683200fc8a4813a
-
SHA256
373f30874b0bf0abdd58ab6b4fe7f1001c651dd1336649dff47b0d877a4afb5e
-
SHA512
a5b9c682fa1f8172c755a09620df394b3dbfca0e3d39eac2fd2edc08b065f7dc3405eee98c4a570301086cd1ae48586c67f6dc7603bef37d39a40dcdd4f82451
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-