General
-
Target
document-2008647060.xls
-
Size
138KB
-
Sample
210312-b4lvnt992j
-
MD5
98524b1d42bf8200f9f4be955932e129
-
SHA1
5b19e2410587494e485add776c63e67c9392fd4a
-
SHA256
e0bb1e54a2782e1d8f1f28235b77db0142b02c598bff425ed10a01cc1bf7fd79
-
SHA512
2ff8ff0d6dae0b2dccf9cc26f1a89fdb6669f49e0c1038e939cba8eea54ce187d142587718d2d3943cd5da7a3538682bf1526cf3f3487dd303a26f6ef111463f
Behavioral task
behavioral1
Sample
document-2008647060.xls
Resource
win7v20201028
Behavioral task
behavioral2
Sample
document-2008647060.xls
Resource
win10v20201028
Malware Config
Extracted
http://gcfxb12aefoyn03epdoji.xyz/i.gif
Targets
-
-
Target
document-2008647060.xls
-
Size
138KB
-
MD5
98524b1d42bf8200f9f4be955932e129
-
SHA1
5b19e2410587494e485add776c63e67c9392fd4a
-
SHA256
e0bb1e54a2782e1d8f1f28235b77db0142b02c598bff425ed10a01cc1bf7fd79
-
SHA512
2ff8ff0d6dae0b2dccf9cc26f1a89fdb6669f49e0c1038e939cba8eea54ce187d142587718d2d3943cd5da7a3538682bf1526cf3f3487dd303a26f6ef111463f
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-