General
-
Target
catalog-241005140.zip
-
Size
50KB
-
Sample
210513-r92mjztc6x
-
MD5
79eb218541fdebefdfbafb671ab741e8
-
SHA1
c1e54d7863dd3b8dbd3ab56df1bc35bd4553e5d6
-
SHA256
339c3bc40f9935d1be78ea13d36b331c82e5cb8fecf0455691592700844a7c79
-
SHA512
8d70e93f7cf182066428dd5d167415a81fab251f0c2f3986f032afc53b24a8fdf64639a3f997ef329431bdb24d0486e7433ab2d6ac5ae1fe6d5294b503a26950
Static task
static1
Behavioral task
behavioral1
Sample
catalog-241005140.xls
Resource
win7v20210408
Behavioral task
behavioral2
Sample
catalog-241005140.xls
Resource
win10v20210408
Malware Config
Extracted
https://smartpalakatva.com/edQsUZOLlE/th.html
https://pilstlcommodities.com/Ov4FlB3lpy/th.html
Targets
-
-
Target
catalog-241005140.xls
-
Size
367KB
-
MD5
688ad6783056fd0380200879beb0e915
-
SHA1
f3b9a70aac8dabbd46fa22d2f95d96faa911fec8
-
SHA256
589255722398bef81da16a4b9e34e7d3b23666ba55ecd6bc90885d58fc63f2c4
-
SHA512
3712c554d1d234bfa2a98600c565975a46a7b32b9f9a4270c96f5e15836834334db4f9cfee04e4c707129957559bdd6d74bb82ab5ab6a5c5171fda64c2e1e6f1
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-