General
-
Target
2226726056.zip
-
Size
1.0MB
-
Sample
220514-rbwcksceel
-
MD5
37c51435d0650df8eaf040ef8b423e58
-
SHA1
b2bd5b6f71a74fe937f140208f2363e6a15c897f
-
SHA256
e2a376d63b1561324cfd9f73d00cbf319a2296a255a18469b82d986f0f323f79
-
SHA512
b55c8716bbfed0674a3179cf97b21adcd5db096981653273b6df458d1a6e0ee1fe5ee72209c4f84d9aee6a20f26070e3fccfac2d66de3407c2e8ebb604f9e5b7
Static task
static1
Behavioral task
behavioral1
Sample
2226726056.xlsb
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
2226726056.xlsb
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://23.227.199.109/44695.667952662.dat
http://77.91.101.69/44695.667952662.dat
http://94.140.114.226/44695.667952662.dat
Extracted
http://23.227.199.109/44695.6679987269.dat
http://77.91.101.69/44695.6679987269.dat
http://94.140.114.226/44695.6679987269.dat
Targets
-
-
Target
2226726056.xlsb
-
Size
1.0MB
-
MD5
58e873b384743f67dce82012e7215a99
-
SHA1
2c89b1b4ec71da38747ce550fdbd3c08da28ca16
-
SHA256
2ffaa815fc7b7b08d66842936025274d08ddbbd38a8478205fed86ece8848650
-
SHA512
312b2aeea61ee6c0d10acae9c163095c8ef0f56953f4ad15350eee82023f6ce4612c17f89fb46e37a920e8b260ba3fc54d6d12c20b1d36ef468f99da4742ab71
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-