General
-
Target
catalog-1873693796.zip
-
Size
50KB
-
Sample
210513-w89gzf71ha
-
MD5
7f794938bd6a6ef89832e9c8d1bf1171
-
SHA1
6a3832b9e7ddfcb520cd5d43e7f7b222008abe0f
-
SHA256
8864b5728bc03472dd8e01326b0b9cf2b717ecd77bdfd9daa8daf0013aad3665
-
SHA512
7049897d075813c904c76a5497c14de7d3087f535e51212ae2347545ecbc18f7879e1d97260a054bc1109167542d491d366e13342180159665452822f101180c
Static task
static1
Behavioral task
behavioral1
Sample
catalog-1873693796.xls
Resource
win7v20210410
Behavioral task
behavioral2
Sample
catalog-1873693796.xls
Resource
win10v20210408
Malware Config
Extracted
https://smartpalakatva.com/edQsUZOLlE/th.html
https://pilstlcommodities.com/Ov4FlB3lpy/th.html
Targets
-
-
Target
catalog-1873693796.xls
-
Size
367KB
-
MD5
c5414224e45ec7499d1104fa95bc7300
-
SHA1
e2c266e749a21225cdf533137537265d45c26c5c
-
SHA256
b9aa0a0043a0bb65a408172bf51aa97110b03bdc3d83a3bf9f0ef4e634c935ea
-
SHA512
d44017a83f582c5f5a52e905382b601b7f09a5dc67e4133b2ec8eb9cd0c2b94179fde9c7dda6c0770c0f08ffb4bba99bd4745cd7236733cf89f14ac9cfc96ebe
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-