General
-
Target
document-61746150.xls
-
Size
139KB
-
Sample
210315-j7dfdcwa6j
-
MD5
5de27c2f774acc114538fd872b44ebf5
-
SHA1
db674003241ed8a426aa7c3538f8423dae0d9751
-
SHA256
8a976336e807b03cf0209c424171dcb9b21e57b15618a81577212bfa13c9d921
-
SHA512
61abd2f0a1ffe5f33deb3315e405f6668ccc2e85162b2e62b6111324ffff200799e64eba64f17572639f4af3b4233b3d4eb4a7e39bd54269c32311488d3acae6
Behavioral task
behavioral1
Sample
document-61746150.xls
Resource
win7v20201028
Behavioral task
behavioral2
Sample
document-61746150.xls
Resource
win10v20201028
Malware Config
Extracted
http://zltw15tzezi03nbmru.xyz/w.gif
Targets
-
-
Target
document-61746150.xls
-
Size
139KB
-
MD5
5de27c2f774acc114538fd872b44ebf5
-
SHA1
db674003241ed8a426aa7c3538f8423dae0d9751
-
SHA256
8a976336e807b03cf0209c424171dcb9b21e57b15618a81577212bfa13c9d921
-
SHA512
61abd2f0a1ffe5f33deb3315e405f6668ccc2e85162b2e62b6111324ffff200799e64eba64f17572639f4af3b4233b3d4eb4a7e39bd54269c32311488d3acae6
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-