General
-
Target
catalog-250355479.zip
-
Size
50KB
-
Sample
210513-6mve1jlyse
-
MD5
a4e99373eebdd42dc6ce7228ed20fa43
-
SHA1
7cb0eb008935ce23b8575312c57d93aa67046659
-
SHA256
c5ca585d11cbe3105aaf9187f308a29da6ad83c30625726b4f4c176eab60baeb
-
SHA512
707850c6e06c66db8f0f2b67fcc383e12eb29aa223ca831366f462c579351fd62b5e3471fdf63af19e2caed1cb669261e9db9f0bf73faf4f76b11f5ab691552a
Static task
static1
Behavioral task
behavioral1
Sample
catalog-250355479.xls
Resource
win7v20210408
Behavioral task
behavioral2
Sample
catalog-250355479.xls
Resource
win10v20210410
Malware Config
Extracted
https://smartpalakatva.com/edQsUZOLlE/th.html
https://pilstlcommodities.com/Ov4FlB3lpy/th.html
Targets
-
-
Target
catalog-250355479.xls
-
Size
367KB
-
MD5
3383ba2bb29cb5ccb5d2d062d0c81c91
-
SHA1
9fcadeb88dab3f3eb873d6e1c127d341b151afea
-
SHA256
ce1817251620fb293c886edcf300ce04de866b82d56493ddd24a130a26ca3c73
-
SHA512
d5dcad1f22e297ef3e9963b02e3b435a6d1e55f5910a15693cb7f13ede88528be5f8b951c1efa8c45a02d5845ea23ca94a4b22ed6c2d068a41a9412bc56634db
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-