General
-
Target
Invoice-0251555475_20211013.xlsb
-
Size
217KB
-
Sample
211018-v7ss4seae5
-
MD5
f57c030d072087acb78cb1c079f8e742
-
SHA1
d5cd3b221022ea5299356910261b4beb942977b8
-
SHA256
37bb5be64b8d6d184a1b39c32b8dbe06ca57f2b6c2962332f708afb5b7ce16c4
-
SHA512
0d8425f26e5d07f3cf5d904c182ce7b7fc38c83dc19a56b23eb4e8c4f5ec12401534cdf4f9560611486930b42404a17da0fb4f04139fbcf531bd5a3af492ef00
Behavioral task
behavioral1
Sample
Invoice-0251555475_20211013.xlsb
Resource
win7-en-20210920
Malware Config
Targets
-
-
Target
Invoice-0251555475_20211013.xlsb
-
Size
217KB
-
MD5
f57c030d072087acb78cb1c079f8e742
-
SHA1
d5cd3b221022ea5299356910261b4beb942977b8
-
SHA256
37bb5be64b8d6d184a1b39c32b8dbe06ca57f2b6c2962332f708afb5b7ce16c4
-
SHA512
0d8425f26e5d07f3cf5d904c182ce7b7fc38c83dc19a56b23eb4e8c4f5ec12401534cdf4f9560611486930b42404a17da0fb4f04139fbcf531bd5a3af492ef00
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-