General
-
Target
Payment Advice.xlsx
-
Size
1.2MB
-
Sample
210810-h59brf4rpe
-
MD5
5b73fe85493ab5de9f1fca6386854f66
-
SHA1
c4ab5b4c915cba9eda255be8a88702aad1aeec81
-
SHA256
04fe8deb7fcd8197c15970a7bd846c6e12c9108aad2464570fd4342b64190e41
-
SHA512
34c02b023f17d9c739e12f6c0ee1c33633f528a87c5ede4e9a65e6ab9487d0a4af3d5f1a4ba5366ef2282423832d150cb31547466d08f1f6d869b3627fce33f3
Static task
static1
Behavioral task
behavioral1
Sample
Payment Advice.xlsx
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Payment Advice.xlsx
Resource
win10v20210410
Malware Config
Targets
-
-
Target
Payment Advice.xlsx
-
Size
1.2MB
-
MD5
5b73fe85493ab5de9f1fca6386854f66
-
SHA1
c4ab5b4c915cba9eda255be8a88702aad1aeec81
-
SHA256
04fe8deb7fcd8197c15970a7bd846c6e12c9108aad2464570fd4342b64190e41
-
SHA512
34c02b023f17d9c739e12f6c0ee1c33633f528a87c5ede4e9a65e6ab9487d0a4af3d5f1a4ba5366ef2282423832d150cb31547466d08f1f6d869b3627fce33f3
Score8/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-