General
-
Target
catalog-2087191249.zip
-
Size
50KB
-
Sample
210513-6ftbazrw2x
-
MD5
1dbd7164094615e39aaed441ae704191
-
SHA1
4ce73b580ebe97c800d7b3236b590b9af165fbf9
-
SHA256
608bdfd3e0badc9647cdfb15f80e08304799b61ca4d7aebaebbe7dc2a140f995
-
SHA512
8f97330ec5e7f869f879b27a33b3d8fd88751b83efbeccddf1dc3505db0427c372108a4b00503803fb127e82891fa7a8a8abe9c599677bfaf47b897a9c753dea
Static task
static1
Behavioral task
behavioral1
Sample
catalog-2087191249.xls
Resource
win7v20210410
Behavioral task
behavioral2
Sample
catalog-2087191249.xls
Resource
win10v20210408
Malware Config
Extracted
https://smartpalakatva.com/edQsUZOLlE/th.html
https://pilstlcommodities.com/Ov4FlB3lpy/th.html
Targets
-
-
Target
catalog-2087191249.xls
-
Size
367KB
-
MD5
3ad535735bd6c4f47802a9264f28da1f
-
SHA1
71240b697a58274c4d1843c0c41742419a901ce9
-
SHA256
fc76befecfbf3d53e5dc772d2b4bc44b20966e892d10f1cc2e56e4760f478a6a
-
SHA512
43bd9e42f0a6b2b8197ca8c8006746d4760fe8e0b6b48ca8d1ff660875adffe514f2e84198830b4dbd2207087f79f5c5fcfaedcc418a86717bb9b71f451dc356
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-