General

  • Target

    Invoice Report.xlsm

  • Size

    140KB

  • Sample

    210721-v4zkaey726

  • MD5

    329c98470c9b2ac55b27ec305a51ed8b

  • SHA1

    6ae68c825f75e57b0ba370f12d90a5e6b65fd6d1

  • SHA256

    8ef3a66715c5224d804d23dbbd9013304a860c6ed346eedc27d73aee31e9b9ea

  • SHA512

    17ecd183f96dd9689c75c3d8682a4ce346b666e50964820da9c4fda0fd8c1e7a96f6649edb02de554cee01ba29eb4a221a804f285895a0d7f57723e34827c0f0

Score
10/10

Malware Config

Targets

    • Target

      Invoice Report.xlsm

    • Size

      140KB

    • MD5

      329c98470c9b2ac55b27ec305a51ed8b

    • SHA1

      6ae68c825f75e57b0ba370f12d90a5e6b65fd6d1

    • SHA256

      8ef3a66715c5224d804d23dbbd9013304a860c6ed346eedc27d73aee31e9b9ea

    • SHA512

      17ecd183f96dd9689c75c3d8682a4ce346b666e50964820da9c4fda0fd8c1e7a96f6649edb02de554cee01ba29eb4a221a804f285895a0d7f57723e34827c0f0

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v6

Tasks