General
-
Target
Cancellation-1376764675-03112021.xls
-
Size
277KB
-
Sample
210311-y72nw4nfen
-
MD5
40a5aaddd126b30b64265ac529798bd0
-
SHA1
ca0f058f2aa9cc2038cf62efd14d5eb82feaaebd
-
SHA256
53762e0edac9d950447b9c55d53b1aa224e8903f69a6f6fa1fe6eb76c3171365
-
SHA512
fa6ef43ce56147e7f5a64dd0b612884dabc19ecb4c5cca40219e3d80db6da2990f39d778b442b3f55e20ba0d0109eebfbdf439a4826b90e424cfbf376d4a53b4
Behavioral task
behavioral1
Sample
Cancellation-1376764675-03112021.xls
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Cancellation-1376764675-03112021.xls
Resource
win10v20201028
Malware Config
Extracted
http://195.123.220.67/44266.6916006944.dat
http://45.150.67.127/44266.6916006944.dat
http://181.215.47.82/44266.6916006944.dat
http://reynare.com/sbazaa/44266.6916006944.dat
http://hosting152231.a2e16.netcup.net/zhrzoxxo/44266.6916006944.dat
Targets
-
-
Target
Cancellation-1376764675-03112021.xls
-
Size
277KB
-
MD5
40a5aaddd126b30b64265ac529798bd0
-
SHA1
ca0f058f2aa9cc2038cf62efd14d5eb82feaaebd
-
SHA256
53762e0edac9d950447b9c55d53b1aa224e8903f69a6f6fa1fe6eb76c3171365
-
SHA512
fa6ef43ce56147e7f5a64dd0b612884dabc19ecb4c5cca40219e3d80db6da2990f39d778b442b3f55e20ba0d0109eebfbdf439a4826b90e424cfbf376d4a53b4
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-