General
-
Target
catalog-2008551307.zip
-
Size
50KB
-
Sample
210513-gnl9eayt7n
-
MD5
2c7abafbacd92228965d4e5f0703c006
-
SHA1
2c39b9380493ae0df0b4dab0e478b673bb30d75f
-
SHA256
5e173d83e4c40a537b896edd9e5f5ee5f4882c96ff7eb8f7945db4ed75e4a47a
-
SHA512
6bdd52d74773bb601ff3387e538acdd38e8247eadec4e447259a4badc90193794201f48581266002abf15488170d68ed5889ac171544ebb050456c6546da946c
Static task
static1
Behavioral task
behavioral1
Sample
catalog-2008551307.xls
Resource
win7v20210410
Behavioral task
behavioral2
Sample
catalog-2008551307.xls
Resource
win10v20210410
Malware Config
Extracted
https://smartpalakatva.com/edQsUZOLlE/th.html
https://pilstlcommodities.com/Ov4FlB3lpy/th.html
Targets
-
-
Target
catalog-2008551307.xls
-
Size
367KB
-
MD5
e376664d5625944a41e4940de7794fb4
-
SHA1
3df9bd129da02cc195fea31bdcc18a0d6c4614c0
-
SHA256
058bceb798d4005018e53e1805a94e59c5336e4b8f71c962b155cfae7719b8e2
-
SHA512
7ec0d1a5e7048ad79c5c68e785b9aac9d269e200c06e11480670dba0de7c06699b7b869470a60516c3cea78e7b0e1af1c2f3d9f865d981421dcb7cddeee4c00a
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-