General
-
Target
notif_2227.xlsb
-
Size
67KB
-
Sample
210316-jahs3k5fzj
-
MD5
b9331085a13ece7ef497f93dcd2741d6
-
SHA1
c8a844989501bf3e47266d4d5a5e083856bb0feb
-
SHA256
07f7f5ac05c7d09206105d3827cdf09e69575f74a0337824ffb0c7fa19dbac0a
-
SHA512
6f4720aa130e45f0c8b1f1f04ae1041c74d4646a04e23e2dd23400333f123b3c3838986e68e101649933951c73665e9bf5d766f762362bea71f3e00d450e0e11
Behavioral task
behavioral1
Sample
notif_2227.xlsb
Resource
win7v20201028
Behavioral task
behavioral2
Sample
notif_2227.xlsb
Resource
win10v20201028
Malware Config
Extracted
http://obbligo.bar/register.jpg
Targets
-
-
Target
notif_2227.xlsb
-
Size
67KB
-
MD5
b9331085a13ece7ef497f93dcd2741d6
-
SHA1
c8a844989501bf3e47266d4d5a5e083856bb0feb
-
SHA256
07f7f5ac05c7d09206105d3827cdf09e69575f74a0337824ffb0c7fa19dbac0a
-
SHA512
6f4720aa130e45f0c8b1f1f04ae1041c74d4646a04e23e2dd23400333f123b3c3838986e68e101649933951c73665e9bf5d766f762362bea71f3e00d450e0e11
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-