General
-
Target
SecuriteInfo.com.Heur.29862.20151
-
Size
170KB
-
Sample
210422-64tvykhd4x
-
MD5
b0a053930116048ce5ba43eb505513ee
-
SHA1
8a22f50fd65575975722cee6169f51e3e497b2e6
-
SHA256
2db9aba962314d68dd87dd2404ce6533cd28e5bbc2098c591fc23b018c3a3982
-
SHA512
e9511026d1e7ccf35ec610e7a9664a706610273dd43112ba0b90e531e03cec1c49eb4a4a3c7a093b0e320c718523e15a07ad7221ab5127edf5b7b5180e876249
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Heur.29862.20151.xlsm
Resource
win7v20210410
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Heur.29862.20151.xlsm
Resource
win10v20210408
Malware Config
Targets
-
-
Target
SecuriteInfo.com.Heur.29862.20151
-
Size
170KB
-
MD5
b0a053930116048ce5ba43eb505513ee
-
SHA1
8a22f50fd65575975722cee6169f51e3e497b2e6
-
SHA256
2db9aba962314d68dd87dd2404ce6533cd28e5bbc2098c591fc23b018c3a3982
-
SHA512
e9511026d1e7ccf35ec610e7a9664a706610273dd43112ba0b90e531e03cec1c49eb4a4a3c7a093b0e320c718523e15a07ad7221ab5127edf5b7b5180e876249
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-