General
-
Target
catalog-295819331.zip
-
Size
50KB
-
Sample
210513-pq3s1tk9d2
-
MD5
4bf21726f7dd2002353ea8452607f4ac
-
SHA1
2b3dc700fc89fa3052de677870a0f463f7cff1f1
-
SHA256
a05844d21f0f0368b9d5a94f2762da6747568bde70395abd6f59a401edd3cc1b
-
SHA512
2ea2bc45b0c44c7a06b1c492ff586a0025d4c97fe591db9da38a761ccd64698f3bd20efdc9ce1f38b1bbb24323491b4b5362877cc709c6d229d6f43da626c87e
Static task
static1
Behavioral task
behavioral1
Sample
catalog-295819331.xls
Resource
win7v20210408
Behavioral task
behavioral2
Sample
catalog-295819331.xls
Resource
win10v20210410
Malware Config
Extracted
https://smartpalakatva.com/edQsUZOLlE/th.html
https://pilstlcommodities.com/Ov4FlB3lpy/th.html
Targets
-
-
Target
catalog-295819331.xls
-
Size
367KB
-
MD5
80a1976552ba348d725db1c3c3ff5a14
-
SHA1
27963b4571a46f1cbd4dc9af90681d16d77e4ef8
-
SHA256
4cb5af26782cfc92d9b813c409352532e5149a3c2b80bdeac5ac1228da568522
-
SHA512
30545af59e4b8e9ee70fe398751b3d6333b50d9cf7745cb5662617c5588ccea29717f8ad1aa59b5e8f355417471a7324bd5e31fbf66388cc7447fc3ac9d33c7d
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-