General
-
Target
Price list.xlsm
-
Size
64KB
-
Sample
210504-vlyhzrlldj
-
MD5
dc48640ca8488d4c4e61b807ef19d11c
-
SHA1
e2cfbc565e62b269a7bfbdf2b3c060e52aaa6614
-
SHA256
c8f3d97c54386b86778a1d20917353583bcf706ffe0615d962683d55e449bcab
-
SHA512
06d0b3420f784cad69e11202271b99f47c7c5eeca68de9a5e01da6ebf2c5b25414ec242dd4517eeff43fcd239ec8ded073a9317c1140ae9e3c6b620b6af741b9
Static task
static1
Behavioral task
behavioral1
Sample
Price list.xlsm
Resource
win7v20210410
Malware Config
Extracted
https://cenga.hr/components/search/pri.ps1
Targets
-
-
Target
Price list.xlsm
-
Size
64KB
-
MD5
dc48640ca8488d4c4e61b807ef19d11c
-
SHA1
e2cfbc565e62b269a7bfbdf2b3c060e52aaa6614
-
SHA256
c8f3d97c54386b86778a1d20917353583bcf706ffe0615d962683d55e449bcab
-
SHA512
06d0b3420f784cad69e11202271b99f47c7c5eeca68de9a5e01da6ebf2c5b25414ec242dd4517eeff43fcd239ec8ded073a9317c1140ae9e3c6b620b6af741b9
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-