General
-
Target
Fattura.xlsb
-
Size
249KB
-
Sample
210416-5ktpd5x6ks
-
MD5
cfb756f36616e64f4da99dce90b25661
-
SHA1
00f48058178e506ad535f7f5c00b632c41ba4b8f
-
SHA256
051770ec73c6bb36b839af3fcdc2e28e14f8e8c24f77f89bdc034c19f05516ed
-
SHA512
fce764ec2d370a3709af0a2a8e1eca125e175e3c14849362a9d301b13f631a44d3dbb2289d1cb224f1357aeaa0da42b0d6c54c544d7c226ca6b9d6f5d6a0a9e6
Behavioral task
behavioral1
Sample
Fattura.xlsb
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Fattura.xlsb
Resource
win10v20210408
Malware Config
Extracted
Targets
-
-
Target
Fattura.xlsb
-
Size
249KB
-
MD5
cfb756f36616e64f4da99dce90b25661
-
SHA1
00f48058178e506ad535f7f5c00b632c41ba4b8f
-
SHA256
051770ec73c6bb36b839af3fcdc2e28e14f8e8c24f77f89bdc034c19f05516ed
-
SHA512
fce764ec2d370a3709af0a2a8e1eca125e175e3c14849362a9d301b13f631a44d3dbb2289d1cb224f1357aeaa0da42b0d6c54c544d7c226ca6b9d6f5d6a0a9e6
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Nloader Payload
-
Loads dropped DLL
-