General
-
Target
cancel_sub_JPL12345678901234.xlsb.zip
-
Size
218KB
-
Sample
210519-y2kz3esn76
-
MD5
fbcf88c7c823f370069c4556f9dd7c91
-
SHA1
5577945b974ea6335fcc37ea80e708cb4295224e
-
SHA256
2abe5df892b139bb3f88019ac0f5b2856c6dd853362dc2f723292fe8d33619c1
-
SHA512
9e8790e89ef5b2ee54b6396ae87e4e344891da636f41d446b6f70d4d6a55ee1555da1256ccef3d521a4cb63b202eb7bcbb24068ef0ff9e42673573ee8d9ddbe3
Behavioral task
behavioral1
Sample
cancel_sub_JPL12345678901234.xlsb
Resource
win7v20210408
Behavioral task
behavioral2
Sample
cancel_sub_JPL12345678901234.xlsb
Resource
win10v20210410
Malware Config
Extracted
Targets
-
-
Target
cancel_sub_JPL12345678901234.xlsb
-
Size
241KB
-
MD5
b4a0b38ff2bd7619e42c0f1d1fb0171b
-
SHA1
c0e61bcc7139bc2342e5a9eb9a2bc056c475624d
-
SHA256
3cc4948d4d3cac89a74284ae4dc49d177b834f295e9f767a46dcd73726b7239d
-
SHA512
8830468a4f8ee1032abe7ede05fdc11fb592355c81447bf0d65b995a6d6a55fc399025084bb74bb7f4b52a14ee7a2ea79a2100480222c1da95e19b3b4a59cff5
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Nloader Payload
-
Blocklisted process makes network request
-
Loads dropped DLL
-