General
-
Target
Documents56.xlsm
-
Size
57KB
-
Sample
210315-6dy7xe3gj2
-
MD5
4168738fae0705c01339de24d3f94b42
-
SHA1
57f932261157a009d070dd0e1475474ca8f7948c
-
SHA256
9bbc391b874c7a1365df81fd20d85cfdc5ec42efab14cbdd00125ec869837043
-
SHA512
3d1ac743d81e629d621f3acbf5848f525f5df7397632553b4576ff162fd1c5fa59285cb4c931329e4739c1cdf17ce1fe72071652de348cf612ffebaa05ef68df
Behavioral task
behavioral1
Sample
Documents56.xlsm
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Documents56.xlsm
Resource
win10v20201028
Malware Config
Extracted
http://sal03gicu03qcwtif.com/index.gif
Targets
-
-
Target
Documents56.xlsm
-
Size
57KB
-
MD5
4168738fae0705c01339de24d3f94b42
-
SHA1
57f932261157a009d070dd0e1475474ca8f7948c
-
SHA256
9bbc391b874c7a1365df81fd20d85cfdc5ec42efab14cbdd00125ec869837043
-
SHA512
3d1ac743d81e629d621f3acbf5848f525f5df7397632553b4576ff162fd1c5fa59285cb4c931329e4739c1cdf17ce1fe72071652de348cf612ffebaa05ef68df
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-