General
-
Target
Info_146854.xlsb_0EE5D05A5FC746C0DF8BC1536808E10E.zip
-
Size
224KB
-
Sample
210315-eytx7tsy56
-
MD5
a94ef931b519dd9c54bebdb467b2f466
-
SHA1
b35d4b41ad7e5e8663ce648edbd78356b306b3ec
-
SHA256
5fc29741107579e4a23c4e65c5ff488f1fad277276ac0eab07de0bb2f09d6c10
-
SHA512
e4987f74d1251259cc04fa10fb41cae7ed6eed68e6921d33e150d1a805aef456e2c4652b128954ba6203bd1f59266cf21a3aef075ea03f4908ebaa4d7965d56a
Behavioral task
behavioral1
Sample
Info_146854.xlsb
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Info_146854.xlsb
Resource
win10v20201028
Malware Config
Extracted
http://195.123.222.188/campo/e/e1
Targets
-
-
Target
Info_146854.xlsb
-
Size
233KB
-
MD5
0ee5d05a5fc746c0df8bc1536808e10e
-
SHA1
80d8c320911b0bc92227bcdc05abb4f7dd67e25d
-
SHA256
5601383e0e5ac72d719ec684afad8e23f390435e31eaa9e726348f24180e1974
-
SHA512
44a011b8b871508b123005c0596f19ad6fe3397bed99e18a406615e80f8564a16e67d3ff35790e03d3d184ae064077b85483ba4078ed3b040efaeb1bf6eeb6b9
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-