General

  • Target

    Information.xlsb

  • Size

    20KB

  • Sample

    201113-72m4k28fbs

  • MD5

    4dddb0320eac6050d6360c92c104d05c

  • SHA1

    816db7af62de3dc200b88357a5341c6ce184cc93

  • SHA256

    ae87b82d817d363b159e072be2e2017dfe0bcf7fd3bc6a7c9dee0ff885eefc5f

  • SHA512

    b177b5faa839aeead6c9c732b0182b928903dd34e02d968b95cd93b2f3f01c3b72043c9dafcb6a96a9d1eeb67e4e12abaf537f7ac32b3d166d7f82914844881d

Malware Config

Targets

    • Target

      Information.xlsb

    • Size

      20KB

    • MD5

      4dddb0320eac6050d6360c92c104d05c

    • SHA1

      816db7af62de3dc200b88357a5341c6ce184cc93

    • SHA256

      ae87b82d817d363b159e072be2e2017dfe0bcf7fd3bc6a7c9dee0ff885eefc5f

    • SHA512

      b177b5faa839aeead6c9c732b0182b928903dd34e02d968b95cd93b2f3f01c3b72043c9dafcb6a96a9d1eeb67e4e12abaf537f7ac32b3d166d7f82914844881d

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Ursnif RM3

      A heavily modified version of Ursnif discovered in the wild.

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks