General
-
Target
WlRE REMITTANCE DOCUMENT.xlsx
-
Size
322KB
-
Sample
230711-p9f97sab8w
-
MD5
e464b0b1510f9b815ce650effd332b8c
-
SHA1
c053fd168e0024b718a71892187c13556889b8ac
-
SHA256
d4f147b8c2eca3fd37cee1d9fdf33e49810ec7a65839c3bcaa2561a10700f16f
-
SHA512
7877f3043f711cfaeb09de26706dfe377cae81f2556a40514aa31629275721d3c31aa6ebaacff0aa6114e941f25523c741155c30e1a43de9788c6f0e28dd76cd
-
SSDEEP
6144:xwihBwhnUiCDVK0V5AEB30+pZLLJQ37Xro6WXCZkSpGfiylngHtnmp7a023vnM:xcVv4KsBk+pZLLEbZNpGfCHtD023vnM
Static task
static1
Behavioral task
behavioral1
Sample
WlRE REMITTANCE DOCUMENT.xlsx
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
WlRE REMITTANCE DOCUMENT.xlsx
Resource
win10v2004-20230703-en
Malware Config
Targets
-
-
Target
WlRE REMITTANCE DOCUMENT.xlsx
-
Size
322KB
-
MD5
e464b0b1510f9b815ce650effd332b8c
-
SHA1
c053fd168e0024b718a71892187c13556889b8ac
-
SHA256
d4f147b8c2eca3fd37cee1d9fdf33e49810ec7a65839c3bcaa2561a10700f16f
-
SHA512
7877f3043f711cfaeb09de26706dfe377cae81f2556a40514aa31629275721d3c31aa6ebaacff0aa6114e941f25523c741155c30e1a43de9788c6f0e28dd76cd
-
SSDEEP
6144:xwihBwhnUiCDVK0V5AEB30+pZLLJQ37Xro6WXCZkSpGfiylngHtnmp7a023vnM:xcVv4KsBk+pZLLEbZNpGfCHtD023vnM
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Legitimate hosting services abused for malware hosting/C2
-