General
-
Target
catalog-1962616992.zip
-
Size
50KB
-
Sample
210513-5jg5bkmz4j
-
MD5
d09eeb94da9b8af044df8ed2decaec62
-
SHA1
1f2bf8b6af9951a458423dc80fd32b18bd17d9d9
-
SHA256
370deb9184eb1670e65921ceeeb39e615c95d8b50afcb0603fead00dea9c47fd
-
SHA512
28241b895a20591774631fe6afd83cef422992518a9ec63a9e9753bdac02aef1ef95a77ce723f86a056661d19538bcd3365e4d790dfc4071f5bab872eb5c553a
Static task
static1
Behavioral task
behavioral1
Sample
catalog-1962616992.xls
Resource
win7v20210410
Behavioral task
behavioral2
Sample
catalog-1962616992.xls
Resource
win10v20210410
Malware Config
Extracted
https://smartpalakatva.com/edQsUZOLlE/th.html
https://pilstlcommodities.com/Ov4FlB3lpy/th.html
Targets
-
-
Target
catalog-1962616992.xls
-
Size
367KB
-
MD5
21000d95df24c6056d6f2900acfe237f
-
SHA1
6bf2e82f051bfcb6c981ba135d7f08cf8d5583b5
-
SHA256
4a79e3aa378992afa6b49514c1083c4281e196a7e330eb16395d3bc033cb188c
-
SHA512
f6544f7ca1cc2ec74fc956d0b0967e63784b06d53d1f6b8ba034ddfdc319489f9a4213f72be978a414e250e76c9be4d89ca72256dc19881d5f225c23cd5560d0
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-