General
-
Target
catalog-2029944831.zip
-
Size
50KB
-
Sample
210513-e3j5vphntn
-
MD5
d4767ced40554ed3501cafd8f3abf4bd
-
SHA1
5b384dbcc4b1ca5cc4a62f24a5a1fe8f2e4238bf
-
SHA256
1db2cc076d0388ebd2a05f1409f44d3576bbddd3118d789b04c2181364c30c89
-
SHA512
1559d3bac84b4efec271f3391f29d0c7169b78716402c3591ee315f062d26ad751b4dbc108548537579b7eee8c278cb834921027f9e5eac9a6a10c18c1b7f32d
Static task
static1
Behavioral task
behavioral1
Sample
catalog-2029944831.xls
Resource
win7v20210410
Behavioral task
behavioral2
Sample
catalog-2029944831.xls
Resource
win10v20210408
Malware Config
Extracted
https://smartpalakatva.com/edQsUZOLlE/th.html
https://pilstlcommodities.com/Ov4FlB3lpy/th.html
Targets
-
-
Target
catalog-2029944831.xls
-
Size
367KB
-
MD5
ae4a7a4a50621c31e771b589f800cfd7
-
SHA1
21020b2f44299266de362ae8817e08a6122e2c6b
-
SHA256
d426f9e1657aa8a09fa039fe9c144fbe5bcb1ce054d8e63c5f9d7a7cbcd74bce
-
SHA512
f80034fc0835c0b18e9f4d5926736471811bc8953702cc7554116e8168ff33c9a9346e2372f8fabef6d3ce5b331f779d5f532ddabf2f6a42920a71d2877e554c
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-