General
-
Target
Payment-YSSZ.xlsb
-
Size
255KB
-
Sample
211013-q6x9zseahk
-
MD5
bbce21ac6ad66c8294621556da70e895
-
SHA1
29ced0cde6a261484013bbc392c230d430eeda47
-
SHA256
b50bc2740da1618a1c0ac3cedffe35a499e0fcf700214736241cf736897fd94a
-
SHA512
f3c547c7f4e523845df876d34eaefc682c5483c7ae45a5aa0851b93dd6480df265a27ef8ac867e6c641dc6a27ede03eac1891c853460fa875b4c6c11f1ac3aa3
Behavioral task
behavioral1
Sample
Payment-YSSZ.xlsb
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
Payment-YSSZ.xlsb
Resource
win10v20210408
Malware Config
Targets
-
-
Target
Payment-YSSZ.xlsb
-
Size
255KB
-
MD5
bbce21ac6ad66c8294621556da70e895
-
SHA1
29ced0cde6a261484013bbc392c230d430eeda47
-
SHA256
b50bc2740da1618a1c0ac3cedffe35a499e0fcf700214736241cf736897fd94a
-
SHA512
f3c547c7f4e523845df876d34eaefc682c5483c7ae45a5aa0851b93dd6480df265a27ef8ac867e6c641dc6a27ede03eac1891c853460fa875b4c6c11f1ac3aa3
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-