Resubmissions

17-12-2020 18:26

201217-fl25lwqv5n 10

08-12-2020 18:10

201208-ejh9brbyes 8

General

  • Target

    Inf-855.xls

  • Size

    31KB

  • Sample

    201217-fl25lwqv5n

  • MD5

    7c7dfa4acc8c7767eded7450a434a355

  • SHA1

    2ee1b3d1376ca3c953fcf2385a478367be408b25

  • SHA256

    c94ac6548943c1f9a85ed599a81ce7fefa81092ee7ad9cce48b3d46a522a9773

  • SHA512

    4c2d9ef6374a9d98c1c0608ef0c1d73a41a3bcac917a7320d0f051dabf9a732dd2efc1cd0299599918d81f59223c5c6003e9153bc89c1c661618dcffd0b2dd6b

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://mobitel-servis.si/vendor.php

xlm40.dropper

https://leadingpips.com/crypt.php

Targets

    • Target

      Inf-855.xls

    • Size

      31KB

    • MD5

      7c7dfa4acc8c7767eded7450a434a355

    • SHA1

      2ee1b3d1376ca3c953fcf2385a478367be408b25

    • SHA256

      c94ac6548943c1f9a85ed599a81ce7fefa81092ee7ad9cce48b3d46a522a9773

    • SHA512

      4c2d9ef6374a9d98c1c0608ef0c1d73a41a3bcac917a7320d0f051dabf9a732dd2efc1cd0299599918d81f59223c5c6003e9153bc89c1c661618dcffd0b2dd6b

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks