General
-
Target
modalita_2856.xlsb
-
Size
70KB
-
Sample
210316-nyq2sya286
-
MD5
7a681936cd2d1120be10991b89776c65
-
SHA1
99afccb9ef18e909d576364ce201ac965188f8bd
-
SHA256
6e67e32cd54565dcf369f52a0617a7c55f0446a4ed1fbf7878f98512e278ccaa
-
SHA512
4eeeee6649e838a15fe59fbb6741aa56e9b53797a0d18f2b9d1a901eec0d21b5027987b8bf22953eedab275fac08c88222906045f9be3a31fbd74b4e1fdcf352
Behavioral task
behavioral1
Sample
modalita_2856.xlsb
Resource
win7v20201028
Behavioral task
behavioral2
Sample
modalita_2856.xlsb
Resource
win10v20201028
Malware Config
Extracted
http://comunicaz.casa/signup.jpg
Targets
-
-
Target
modalita_2856.xlsb
-
Size
70KB
-
MD5
7a681936cd2d1120be10991b89776c65
-
SHA1
99afccb9ef18e909d576364ce201ac965188f8bd
-
SHA256
6e67e32cd54565dcf369f52a0617a7c55f0446a4ed1fbf7878f98512e278ccaa
-
SHA512
4eeeee6649e838a15fe59fbb6741aa56e9b53797a0d18f2b9d1a901eec0d21b5027987b8bf22953eedab275fac08c88222906045f9be3a31fbd74b4e1fdcf352
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-