General
-
Target
catalog-2131836968.zip
-
Size
50KB
-
Sample
210513-kkf475zbhx
-
MD5
64ee7575115b1b217da59b8722f04a6b
-
SHA1
43c9b06fe08f2ff82e3bd683df906e9a24b89f9c
-
SHA256
81d9d4d40c6f3cc82a3b4f61bca0324e76f75a416f2e2271db56b802b341468f
-
SHA512
bdb42c9ba9096751d611ae0aca9a7addc7b400e9306dcc5f3487bab4cf34b79a6a0eac412ed1d2205607dc6cf1171f9841b1d629578f08b09205af186f6a95fe
Static task
static1
Behavioral task
behavioral1
Sample
catalog-2131836968.xls
Resource
win7v20210408
Behavioral task
behavioral2
Sample
catalog-2131836968.xls
Resource
win10v20210408
Malware Config
Extracted
https://smartpalakatva.com/edQsUZOLlE/th.html
https://pilstlcommodities.com/Ov4FlB3lpy/th.html
Targets
-
-
Target
catalog-2131836968.xls
-
Size
367KB
-
MD5
16751532b0208a9b159783dd9486c83f
-
SHA1
de9f4847c8eb9f0c5fb7f5c2d9e3d4904d44e62c
-
SHA256
538289db6e2c31428d6f7badd4b89e6f03249a460b410b06c3326183f14c5b3a
-
SHA512
3be76a98e279215668c24db0de60eab2c17baeeb1c52585141b79e25ec35d41faa0506548675971f2a3d84a4e0956ce6ad6478d464ce345fd1bc1540da475a4c
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-