General
-
Target
document-2061627660.xls
-
Size
138KB
-
Sample
210312-tv9w69enf6
-
MD5
94c6010b894bdecb41a46a1a4e30787c
-
SHA1
04bdee48efcf8904565a06e6fc2647b6ee2b14c8
-
SHA256
f03836c1f8acdc207e8c3e76a4ba85cffc2979035dc6eb826110160ef8fc9634
-
SHA512
97513d9659f844ed477443578fc6901a392a23b67b63ffd82b1e55897f34c80d71863894f2e41f671aa6b3edf1fcb77d456bee2bc803e8308e4898872b18c6e5
Behavioral task
behavioral1
Sample
document-2061627660.xls
Resource
win7v20201028
Behavioral task
behavioral2
Sample
document-2061627660.xls
Resource
win10v20201028
Malware Config
Extracted
http://ipok12bcame03shzpiq.xyz/i.gif
Targets
-
-
Target
document-2061627660.xls
-
Size
138KB
-
MD5
94c6010b894bdecb41a46a1a4e30787c
-
SHA1
04bdee48efcf8904565a06e6fc2647b6ee2b14c8
-
SHA256
f03836c1f8acdc207e8c3e76a4ba85cffc2979035dc6eb826110160ef8fc9634
-
SHA512
97513d9659f844ed477443578fc6901a392a23b67b63ffd82b1e55897f34c80d71863894f2e41f671aa6b3edf1fcb77d456bee2bc803e8308e4898872b18c6e5
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-