General
-
Target
Invoice #035.xlsm
-
Size
155KB
-
Sample
210421-ygskj3c65s
-
MD5
77f482d7c33d70474d451cf2546f4b4f
-
SHA1
9ef86f2a8171e50ec5734886d895885280e029d8
-
SHA256
8bdcc1592ffaee9154ed4331a44fa52af3b2baebbd4ef71840adc73b38635d9e
-
SHA512
f656c8f2a14ddb066469f20ab5303f5a0ec18d17648e67a59fde4902dc923f5a70fe4cc4964251a705275e98073df76821ec6e3ee8d93982fb86ec71a698404a
Static task
static1
Malware Config
Targets
-
-
Target
Invoice #035.xlsm
-
Size
155KB
-
MD5
77f482d7c33d70474d451cf2546f4b4f
-
SHA1
9ef86f2a8171e50ec5734886d895885280e029d8
-
SHA256
8bdcc1592ffaee9154ed4331a44fa52af3b2baebbd4ef71840adc73b38635d9e
-
SHA512
f656c8f2a14ddb066469f20ab5303f5a0ec18d17648e67a59fde4902dc923f5a70fe4cc4964251a705275e98073df76821ec6e3ee8d93982fb86ec71a698404a
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Downloads MZ/PE file
-
Loads dropped DLL
-