General
-
Target
catalog-2097704966.zip
-
Size
50KB
-
Sample
210513-pqyck8pk42
-
MD5
b7d1e77895c90abe3b2ce5a04fdb35de
-
SHA1
3d5b020510b8b3c3c6cf99e0c8ac78cfe2c78826
-
SHA256
12a3bd739b931614da626b320973016a0b532439059071736df7e258b33e98ba
-
SHA512
418f47ec237a5ab24bd11cd7345b3e9803458e2c65d70b4ab0b5803c003ab8ca18ce72b8cfca4292c730784e74104d3c67999b0851bf1735be46c97c77bde098
Static task
static1
Behavioral task
behavioral1
Sample
catalog-2097704966.xls
Resource
win7v20210410
Behavioral task
behavioral2
Sample
catalog-2097704966.xls
Resource
win10v20210410
Malware Config
Extracted
https://smartpalakatva.com/edQsUZOLlE/th.html
https://pilstlcommodities.com/Ov4FlB3lpy/th.html
Targets
-
-
Target
catalog-2097704966.xls
-
Size
367KB
-
MD5
0e176677de88cf7386da5966e193f625
-
SHA1
8ae207b65d1fb18d53f70739a122ca149844ec04
-
SHA256
f4083089ebee6a2ffd3060a4dcb38ace244323975f1da010ea0d90ef33ff9166
-
SHA512
32d1691d5353b0392a2b5534cfb079117429282089636617e30eab011f141519cf149c2727b240611c29c14f233765361e02a42e85115919b675212794b40565
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-