General
-
Target
CompensationClaim_1729801533_03122021.xls
-
Size
280KB
-
Sample
210312-b7rszq4ate
-
MD5
21ecbc98f12c0adf8d48d35ace2deb89
-
SHA1
59c762ee1205a475622c6994d912240005909dcb
-
SHA256
2fc9fd3ba89f4bc0b34597521c727dcfcb1106c18791c1ec25de7ba55a6dd317
-
SHA512
71c20443aac41a27ed344f693dd697cd075650d3444ce833287006b8cd27ea078bbab441c0e95934117c17709e9a81a3f29f35759508188590d7fc2a0122d87b
Behavioral task
behavioral1
Sample
CompensationClaim_1729801533_03122021.xls
Resource
win7v20201028
Behavioral task
behavioral2
Sample
CompensationClaim_1729801533_03122021.xls
Resource
win10v20201028
Malware Config
Extracted
http://185.82.219.161/44267.7945251157.dat
http://45.140.146.26/44267.7945251157.dat
http://188.127.227.167/44267.7945251157.dat
http://44267.7945251157.dat
Targets
-
-
Target
CompensationClaim_1729801533_03122021.xls
-
Size
280KB
-
MD5
21ecbc98f12c0adf8d48d35ace2deb89
-
SHA1
59c762ee1205a475622c6994d912240005909dcb
-
SHA256
2fc9fd3ba89f4bc0b34597521c727dcfcb1106c18791c1ec25de7ba55a6dd317
-
SHA512
71c20443aac41a27ed344f693dd697cd075650d3444ce833287006b8cd27ea078bbab441c0e95934117c17709e9a81a3f29f35759508188590d7fc2a0122d87b
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-