General
-
Target
catalog-2002253741.zip
-
Size
50KB
-
Sample
210513-g61mgdbfdn
-
MD5
0f6daeba77fe08037e7751c62b1d7e6f
-
SHA1
11ebc49bc61740a6a9243b4525a55306f16fbf24
-
SHA256
8471ba21698163c769ff0fb55babf56f7d586c1c01dcc6914f1a17c53f91cf39
-
SHA512
f22fe8cd26a21ede0963cf1b1386db9269dbaf5648dc549740f760307c3c808178445787b3ba86dbf0890bc41d0f02aac4bde711de1573924caff24aed590955
Static task
static1
Behavioral task
behavioral1
Sample
catalog-2002253741.xls
Resource
win7v20210410
Behavioral task
behavioral2
Sample
catalog-2002253741.xls
Resource
win10v20210408
Malware Config
Extracted
https://smartpalakatva.com/edQsUZOLlE/th.html
https://pilstlcommodities.com/Ov4FlB3lpy/th.html
Targets
-
-
Target
catalog-2002253741.xls
-
Size
367KB
-
MD5
d3fbb2486b3effa30f87eb8eec28929b
-
SHA1
0b9e5f64275f6e5cd5d6efe23979dd7dceac9667
-
SHA256
022b64e1a59eb7c5dfbac86cca9b1c98403a1547e96d9a5529a5eb7d958b810d
-
SHA512
a9f4d6cecd20ea415aa6ef7d54b50976d8443d7fcb8c5e48b9d782a533a49f4a1fb9d1bc0aaaa00dbcf4a00bc2321a38fb7dbdc8f3b0a8eb01a946e41f2c091d
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-