General
-
Target
_attached_file (65).zip
-
Size
33KB
-
Sample
210312-n9e7k46fa6
-
MD5
f508dbc09d4051917a8525ca71ea0af5
-
SHA1
2524ffc0ca40054869776f0cbea6de7088d66531
-
SHA256
075e9941b491dc384744873446eee63d2ee56afa33a9d125f5ab67d88281bf3f
-
SHA512
24e1dc0a42ea6e854ba8f02d2f1a4f95ecbd2231dbe68b876fdaeaadaf43a3d6b9a2220bb8060ddf8a734d74defe2e69ba6a0aaf22fceab18a5f4f4730b6b104
Behavioral task
behavioral1
Sample
document-246961895.xls
Resource
win7v20201028
Behavioral task
behavioral2
Sample
document-246961895.xls
Resource
win10v20201028
Malware Config
Extracted
http://gcfxb12aefoyn03epdoji.xyz/i.gif
Targets
-
-
Target
document-246961895.xls
-
Size
138KB
-
MD5
daf8e8e76614a4d0d15d8cbd57adefd2
-
SHA1
12213007f05143448971f1e306eb0724b60bbb9b
-
SHA256
d8e3f79d4c4e19a8562abfb10a88303b97d5bfaca4d1b7d152881923f813cac8
-
SHA512
d16387f4ae9c736fe835674ca776dbfd287b1433ac992ae60d4cd2c6f066f8adb7969063854b38cd7d92a50a89f407c81f95fe01b16c244fc39fc1b48a07b234
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-