General

  • Target

    Vouch_me.xlsm

  • Size

    48KB

  • Sample

    200708-t28z2prmx2

  • MD5

    7d50d1522e40087223060bc413bcf35d

  • SHA1

    b1e708e5e73698623944736c81b86c6d58d230d4

  • SHA256

    3d2f4071f4039fc8d0fa05ecc9cbad6f350e028dbae28f059d6f40446e688a16

  • SHA512

    7cd7614be761191844f6506ee66d94cb4729ff3a7be33f96e2eba830fc1f079fa2897d5564f47349e227c233769acd6e5d30f43ffd4232207fd92e25905d7abe

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://seedwellresources.xyz/uT5wiEYASje8CME.exe

Targets

    • Target

      Vouch_me.xlsm

    • Size

      48KB

    • MD5

      7d50d1522e40087223060bc413bcf35d

    • SHA1

      b1e708e5e73698623944736c81b86c6d58d230d4

    • SHA256

      3d2f4071f4039fc8d0fa05ecc9cbad6f350e028dbae28f059d6f40446e688a16

    • SHA512

      7cd7614be761191844f6506ee66d94cb4729ff3a7be33f96e2eba830fc1f079fa2897d5564f47349e227c233769acd6e5d30f43ffd4232207fd92e25905d7abe

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blacklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks