General
-
Target
49262f46a15258d7f43cc856db09e27b215cf1b3862ed9f391c56b7e434c2113.xlsm
-
Size
22KB
-
Sample
210315-9ff8ktrbqa
-
MD5
796e105620245de98c08a943e07c59fe
-
SHA1
59e7f0120318b1b225d12e0fab971c8a85c5fa12
-
SHA256
49262f46a15258d7f43cc856db09e27b215cf1b3862ed9f391c56b7e434c2113
-
SHA512
962769b4de38765a757deda5550bc82fb145887513d07134755ebc4bef2078c78433679b6ca1a1e0af0e4bfae5c0060ba5df4f94f8e5b385174d622669c05a1a
Behavioral task
behavioral1
Sample
49262f46a15258d7f43cc856db09e27b215cf1b3862ed9f391c56b7e434c2113.xlsm
Resource
win7v20201028
Behavioral task
behavioral2
Sample
49262f46a15258d7f43cc856db09e27b215cf1b3862ed9f391c56b7e434c2113.xlsm
Resource
win10v20201028
Malware Config
Extracted
https://login2.co.in/server.php
https://app.advbabu.com/server.php
Targets
-
-
Target
49262f46a15258d7f43cc856db09e27b215cf1b3862ed9f391c56b7e434c2113.xlsm
-
Size
22KB
-
MD5
796e105620245de98c08a943e07c59fe
-
SHA1
59e7f0120318b1b225d12e0fab971c8a85c5fa12
-
SHA256
49262f46a15258d7f43cc856db09e27b215cf1b3862ed9f391c56b7e434c2113
-
SHA512
962769b4de38765a757deda5550bc82fb145887513d07134755ebc4bef2078c78433679b6ca1a1e0af0e4bfae5c0060ba5df4f94f8e5b385174d622669c05a1a
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Deletes itself
-