General
-
Target
5838152208121856.zip
-
Size
131KB
-
Sample
210727-blltept8yn
-
MD5
302da6fb17c9dabb456ec75ffa3db460
-
SHA1
04fdc8dc4e9a5b9a547228c37c55343ddd121c97
-
SHA256
8144e99db9c3d7782ffd9a9faffb1d1821842dbbb907bdb458f2a3ae088648a1
-
SHA512
b933ff82683bbbeb75daf8c6e9681e34bbbd83bfc9bb58b3ee26291cbab575b4381fde0757a7f0d7b51631ef6536c67cb8035fb131408c814a0c3998dfc34114
Behavioral task
behavioral1
Sample
analysis-1808712384.xlsb
Resource
win7v20210410
Behavioral task
behavioral2
Sample
analysis-1808712384.xlsb
Resource
win10v20210408
Malware Config
Extracted
https://phacdochuabenh.com/jJTYkIFPp6x/yy.html
https://mobilesmsmarketing.online/1knoj4Bd3F0/yy.html
Targets
-
-
Target
analysis-1808712384.xlsb
-
Size
142KB
-
MD5
e9d54291f481858ce92cfa7542db7e15
-
SHA1
19685ad8b987846231c1615aa2f90d74ecb1f7f4
-
SHA256
8d076c43b33231edb93313f5a0e311492b4c2d51888d6a6b6a42ad535f1be2d6
-
SHA512
559917816900aedbc9973daa529975d19db2558d74ab30102aeecf23ece4efa0263f49fdaf5f9460d0baadc38f11c5a3c8eeb1af0570e2a85be97df32e505179
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-