General
-
Target
subscription_number.xlsb
-
Size
254KB
-
Sample
210414-wa56mlcrcx
-
MD5
31db3473a93ac2831bd895b0d83154ec
-
SHA1
aaef0d7e0bd4094c0ecbc19c69cc85954f209820
-
SHA256
aae2cf00546070edda9898e8439236bb06001d46d2649d8a859a5952bb5229dd
-
SHA512
4a101bb696343a2ffc89834b366d411e0398ed2f06091bbbb32fe1caa3ec39e3ac95782a2235ccff3bafa8c1801b09616921cb228fe7eb3f6c253b20db138a65
Behavioral task
behavioral1
Sample
subscription_number.xlsb
Resource
win7v20210410
Malware Config
Extracted
Targets
-
-
Target
subscription_number.xlsb
-
Size
254KB
-
MD5
31db3473a93ac2831bd895b0d83154ec
-
SHA1
aaef0d7e0bd4094c0ecbc19c69cc85954f209820
-
SHA256
aae2cf00546070edda9898e8439236bb06001d46d2649d8a859a5952bb5229dd
-
SHA512
4a101bb696343a2ffc89834b366d411e0398ed2f06091bbbb32fe1caa3ec39e3ac95782a2235ccff3bafa8c1801b09616921cb228fe7eb3f6c253b20db138a65
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Nloader Payload
-
Blocklisted process makes network request
-
Loads dropped DLL
-