General
-
Target
SecuriteInfo.com.Heur.2958.19150
-
Size
163KB
-
Sample
210422-pnm9w4ncr6
-
MD5
35bdb83445254ac57d3b471b002dca1a
-
SHA1
29738a1203c188b3a6d33322e4f7982b0a4e8f66
-
SHA256
6b06bf3d865e5eddab7920e5b00ffefd032b152557e1e74ac3b262909ee20b3a
-
SHA512
e059756124faf2cc5ae84b73780e2ead61e206a73465c7345d9b37b60766d3baf756e33fff4270acc17b8e9d5e52c8c13e8bd04b76e1833f966e58a7b829e26c
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Heur.2958.19150.xlsm
Resource
win7v20210410
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Heur.2958.19150.xlsm
Resource
win10v20210408
Malware Config
Targets
-
-
Target
SecuriteInfo.com.Heur.2958.19150
-
Size
163KB
-
MD5
35bdb83445254ac57d3b471b002dca1a
-
SHA1
29738a1203c188b3a6d33322e4f7982b0a4e8f66
-
SHA256
6b06bf3d865e5eddab7920e5b00ffefd032b152557e1e74ac3b262909ee20b3a
-
SHA512
e059756124faf2cc5ae84b73780e2ead61e206a73465c7345d9b37b60766d3baf756e33fff4270acc17b8e9d5e52c8c13e8bd04b76e1833f966e58a7b829e26c
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-