General
-
Target
catalog-304472226.zip
-
Size
50KB
-
Sample
210513-jy5ff8wdsn
-
MD5
ec4c53930a707b4a1f7a022b8c9b8ac6
-
SHA1
0e8ed49d969b13ab6c8f614a5306ca632746ab4c
-
SHA256
2cc8487e2bddce36594cb5353e9b62ee34567d3b10421e5b6f1506412b1dcb24
-
SHA512
570a96a19a08fdbb043214524c0b86916aec3f92aaaf24704f6687f4bdb47b21bb18fd86c0d4ac47ff21c68026fbda92daa2339af0f328c571981a9d10455dd9
Static task
static1
Behavioral task
behavioral1
Sample
catalog-304472226.xls
Resource
win7v20210408
Behavioral task
behavioral2
Sample
catalog-304472226.xls
Resource
win10v20210410
Malware Config
Extracted
https://smartpalakatva.com/edQsUZOLlE/th.html
https://pilstlcommodities.com/Ov4FlB3lpy/th.html
Targets
-
-
Target
catalog-304472226.xls
-
Size
367KB
-
MD5
a2ae007b310460d9aa2ad66b4004a68f
-
SHA1
6f755785a20ab943b6e6534471c9af0aec8c3227
-
SHA256
90ecfdcdc3b8d4fd6f352b6cb0072842b9989803fa13fd95b2d53a280c8a112a
-
SHA512
db5a050fac0b005c97a2a6e846873a5b78965c0078d67516a5bd2596ffac4a389598bfa3281792752702d8cca519fb3134c7f1a13dd4238fdc3efba46961be37
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-