General
-
Target
_____.xlsb
-
Size
225KB
-
Sample
210411-w1lyba9clx
-
MD5
0abe41c27fa3f1e62b74ff4903887d86
-
SHA1
3707fed2be2ec70152bdc5cd691137a7d6b62013
-
SHA256
67c35a01ebe2933d5772677793719c2702ef18274e84fc188f5eb6eee4f32752
-
SHA512
0b6bc4a8f420c9cb463fa10ec1cfe64cf90ee132ee2f46ec739c381e0d2a21d848896cf1d89b88de9fb6d7b88c2ebc1c497ee8cba08205802c372da5e707f7a9
Behavioral task
behavioral1
Sample
_____.xlsb
Resource
win7v20201028
Malware Config
Extracted
Targets
-
-
Target
_____.xlsb
-
Size
225KB
-
MD5
0abe41c27fa3f1e62b74ff4903887d86
-
SHA1
3707fed2be2ec70152bdc5cd691137a7d6b62013
-
SHA256
67c35a01ebe2933d5772677793719c2702ef18274e84fc188f5eb6eee4f32752
-
SHA512
0b6bc4a8f420c9cb463fa10ec1cfe64cf90ee132ee2f46ec739c381e0d2a21d848896cf1d89b88de9fb6d7b88c2ebc1c497ee8cba08205802c372da5e707f7a9
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Nloader Payload
-
Loads dropped DLL
-