General
-
Target
catalog-1972536037.zip
-
Size
50KB
-
Sample
210513-vk2xhw73cx
-
MD5
358f008ad641aab76d646da39777fd43
-
SHA1
16130db30a50619a2da1a069ffeedd80bf3cecd4
-
SHA256
fe94a86cbf3fe63126171bb635e044b13e4400be0d5c1121edc58916a99af745
-
SHA512
711f96d27ea4cabe313d8f659440ac0beb98cd914dd54ba47179420042e94c1f29c8df03e9321ebb52bce1dc05c1dbcbe5c5596d01f9784d8da1e365d8d0caf8
Static task
static1
Behavioral task
behavioral1
Sample
catalog-1972536037.xls
Resource
win7v20210410
Behavioral task
behavioral2
Sample
catalog-1972536037.xls
Resource
win10v20210410
Malware Config
Extracted
https://smartpalakatva.com/edQsUZOLlE/th.html
https://pilstlcommodities.com/Ov4FlB3lpy/th.html
Targets
-
-
Target
catalog-1972536037.xls
-
Size
367KB
-
MD5
e577b097a4850fad9bd1180d253ecc91
-
SHA1
f84b2d90d1c7187b3b47b85cdc592aa9c4f8e9ee
-
SHA256
f1f4910774a47c957fea118cf2d86636880f6537f3ea57aed343ba50e6ad20b7
-
SHA512
df9d590bb3ae593a94b61fa30c305834dc56a419e8f550ceeae56ac1e92edbcb767b393b7ea339e03a81f458e75160e9a0fba5f3ce5389cbcffbc9005a6fb0b0
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-