General
-
Target
Invoice-619401385_20211021.xlsb
-
Size
242KB
-
Sample
211021-tsbqlsbdcq
-
MD5
bd72bbf56fe20c6d617592b34a811ec2
-
SHA1
841fb8268ceb0fadde341a3c91a3e380d54d3d0b
-
SHA256
1e92fde2a582256674c8528113695e810990fb4b48b84287e3bcaca224d6cc53
-
SHA512
bf8d060a91762f8e3570835f8ae096f9bdfe5edee80eb0d9b80e574cc3831ea9575d2728afeeaf812d9af157cfd3eddac14fbb20754599e0fee1e208ab084d09
Behavioral task
behavioral1
Sample
Invoice-619401385_20211021.xlsb
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
Invoice-619401385_20211021.xlsb
Resource
win10-en-20210920
Malware Config
Targets
-
-
Target
Invoice-619401385_20211021.xlsb
-
Size
242KB
-
MD5
bd72bbf56fe20c6d617592b34a811ec2
-
SHA1
841fb8268ceb0fadde341a3c91a3e380d54d3d0b
-
SHA256
1e92fde2a582256674c8528113695e810990fb4b48b84287e3bcaca224d6cc53
-
SHA512
bf8d060a91762f8e3570835f8ae096f9bdfe5edee80eb0d9b80e574cc3831ea9575d2728afeeaf812d9af157cfd3eddac14fbb20754599e0fee1e208ab084d09
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-