General
-
Target
sample.xlsm
-
Size
83KB
-
Sample
210505-h6e557ygse
-
MD5
bb6fc5f43fe2e829d3cad6f5b906046f
-
SHA1
8a2b0c47801d6817d2b6021516623a2d9c6542fa
-
SHA256
806cbd4bab7e77c8a90661c5f92d347ac3e6ba869f1ff1f7b27c5e289ff105ff
-
SHA512
4a6d83cf5cfd788ddba7a15dfb7396805552c816cb6f615b87101b22789e8b1e1032799f1be1f8110f9ef89f6688e3b8476f95916b37eb6901fe3aa39a214bf3
Static task
static1
Malware Config
Targets
-
-
Target
sample.xlsm
-
Size
83KB
-
MD5
bb6fc5f43fe2e829d3cad6f5b906046f
-
SHA1
8a2b0c47801d6817d2b6021516623a2d9c6542fa
-
SHA256
806cbd4bab7e77c8a90661c5f92d347ac3e6ba869f1ff1f7b27c5e289ff105ff
-
SHA512
4a6d83cf5cfd788ddba7a15dfb7396805552c816cb6f615b87101b22789e8b1e1032799f1be1f8110f9ef89f6688e3b8476f95916b37eb6901fe3aa39a214bf3
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Downloads MZ/PE file
-
Loads dropped DLL
-