General
-
Target
modal_718.xlsb
-
Size
79KB
-
Sample
210316-lcdcya9g4j
-
MD5
9e72681925e64f5de7c1549c1b9cb3e2
-
SHA1
cac2cced890bae7a9ca73702f753c974dc640898
-
SHA256
5958cb7775ebbdcb84a6b278dc5074cad2dd55ce9eb06c7aeed4f08077470bd5
-
SHA512
49d5060e1c3b2ebf0c6c1e823f0aa5ca64629dc0b72ba0a83cdced129eda3607811bb83cb9f2070b2acd4fde9a99e23f174a953bc025df6e1847806e4e56dbdc
Behavioral task
behavioral1
Sample
modal_718.xlsb
Resource
win7v20201028
Behavioral task
behavioral2
Sample
modal_718.xlsb
Resource
win10v20201028
Malware Config
Extracted
http://trimestre.casa/register.jpg
Targets
-
-
Target
modal_718.xlsb
-
Size
79KB
-
MD5
9e72681925e64f5de7c1549c1b9cb3e2
-
SHA1
cac2cced890bae7a9ca73702f753c974dc640898
-
SHA256
5958cb7775ebbdcb84a6b278dc5074cad2dd55ce9eb06c7aeed4f08077470bd5
-
SHA512
49d5060e1c3b2ebf0c6c1e823f0aa5ca64629dc0b72ba0a83cdced129eda3607811bb83cb9f2070b2acd4fde9a99e23f174a953bc025df6e1847806e4e56dbdc
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-