General
-
Target
this_issue (72).zip
-
Size
42KB
-
Sample
210315-47cef4z2yx
-
MD5
9bec294c1292e421bd636077ab67ce7c
-
SHA1
d6cc34658f7b7e83ba6d688470a59f59a4a79416
-
SHA256
24bdc455f832ebe94c81c38493191bf3415e91377f2c336f88d634b77a0d55ed
-
SHA512
43f79abd0b040f71e9a1a592d72b8571d5dc644d8ab23ca0722f3e903ba69e0c3934e63032dfb0f5d787311458f7c539cfe6f45c7bf09ddd3a65b67f24b64bef
Behavioral task
behavioral1
Sample
Documents492.xlsm
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Documents492.xlsm
Resource
win10v20201028
Malware Config
Extracted
http://sal03gicu03qcwtif.com/index.gif
Targets
-
-
Target
Documents492.xlsm
-
Size
57KB
-
MD5
4168738fae0705c01339de24d3f94b42
-
SHA1
57f932261157a009d070dd0e1475474ca8f7948c
-
SHA256
9bbc391b874c7a1365df81fd20d85cfdc5ec42efab14cbdd00125ec869837043
-
SHA512
3d1ac743d81e629d621f3acbf5848f525f5df7397632553b4576ff162fd1c5fa59285cb4c931329e4739c1cdf17ce1fe72071652de348cf612ffebaa05ef68df
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-