General
-
Target
tipo_2379.xlsb
-
Size
66KB
-
Sample
210316-seh6webhga
-
MD5
16ccf07b3e1df46cbdbb04b4102dca2c
-
SHA1
e3b05d3d554c0a21630769d8ba0ade598836c019
-
SHA256
e593b43c468f1c38b1ff688ab87b9c0265692531d981f12a67362ae62f134a51
-
SHA512
c41871545522cd3357577ca90564355d12a0a1819229a01dd50ed0b754ddb8138d7d771c7bedb05aa90e3a41620adbedc4f128f9043e8d17d252ea867001050d
Behavioral task
behavioral1
Sample
tipo_2379.xlsb
Resource
win7v20201028
Behavioral task
behavioral2
Sample
tipo_2379.xlsb
Resource
win10v20201028
Malware Config
Extracted
http://statalines.bar/home.jpg
Targets
-
-
Target
tipo_2379.xlsb
-
Size
66KB
-
MD5
16ccf07b3e1df46cbdbb04b4102dca2c
-
SHA1
e3b05d3d554c0a21630769d8ba0ade598836c019
-
SHA256
e593b43c468f1c38b1ff688ab87b9c0265692531d981f12a67362ae62f134a51
-
SHA512
c41871545522cd3357577ca90564355d12a0a1819229a01dd50ed0b754ddb8138d7d771c7bedb05aa90e3a41620adbedc4f128f9043e8d17d252ea867001050d
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-