General
-
Target
catalog-291206972.zip
-
Size
50KB
-
Sample
210513-y4xyh4nwgn
-
MD5
a139ed7676ed79090bd79551e7456272
-
SHA1
7ea748c399df1d5ec5dcfcf4fd2f351da75ec819
-
SHA256
abc62cd45f49e2a363fc97e4a813ea03fa006d4063652b9e06bd41dfb621ddd3
-
SHA512
5b5f56cb7924f49634e65b057d81023b927b7dbb52f46734fa03b6f3434b3e80b5da604ee652b49c35ddadd2e0c775df5cdd8e43cbf3554578e82bd5df849271
Static task
static1
Behavioral task
behavioral1
Sample
catalog-291206972.xls
Resource
win7v20210410
Behavioral task
behavioral2
Sample
catalog-291206972.xls
Resource
win10v20210410
Malware Config
Extracted
https://smartpalakatva.com/edQsUZOLlE/th.html
https://pilstlcommodities.com/Ov4FlB3lpy/th.html
Targets
-
-
Target
catalog-291206972.xls
-
Size
367KB
-
MD5
2ace7f812b812a87db109c09ebdb1b58
-
SHA1
b6240850c6bd9eed17f936d8c4a950e09afe83c5
-
SHA256
b5ce168b00c7cf58cad2a9b4f21b1025710dd6921d908f40c7cabd77de877e11
-
SHA512
3fcfcb979ad0306283e59b9d0970d4d1cd3d7f6d31209a8982c0bfe80d483d774438ec7b638b459d273a8a143cbbd6478ae7c426c759e85222748e47b10c06b1
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-