General
-
Target
Documents455.xlsm
-
Size
57KB
-
Sample
210315-y944sfh7q6
-
MD5
48f94f4fccda26ad7944d041729923ae
-
SHA1
0548fd594ef2ab9d0e200dd411893882b94b8940
-
SHA256
ec928e9f10b2097621f5a01e4f4a902777365b7a07765a5f94348387d0bb951b
-
SHA512
b14624d2ae5e7352dc7105d40fb2d270f47f8eb1567d66397bd1584f4dc966b4d27a6861e24d04376b7b664f65ce188cc36dcfccebfe23be8ecb2482f5262d1f
Behavioral task
behavioral1
Sample
Documents455.xlsm
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Documents455.xlsm
Resource
win10v20201028
Malware Config
Extracted
http://cfkko03vvxohq03taep.com/index.gif
Targets
-
-
Target
Documents455.xlsm
-
Size
57KB
-
MD5
48f94f4fccda26ad7944d041729923ae
-
SHA1
0548fd594ef2ab9d0e200dd411893882b94b8940
-
SHA256
ec928e9f10b2097621f5a01e4f4a902777365b7a07765a5f94348387d0bb951b
-
SHA512
b14624d2ae5e7352dc7105d40fb2d270f47f8eb1567d66397bd1584f4dc966b4d27a6861e24d04376b7b664f65ce188cc36dcfccebfe23be8ecb2482f5262d1f
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-