General

  • Target

    order_receipt.xls

  • Size

    276KB

  • Sample

    210114-3dy8g112zj

  • MD5

    66ca579b793dc4367aba256fa62f9bf2

  • SHA1

    deb4047fdd1b203d4202cc716df2d01a35730229

  • SHA256

    1c01354cd22e2e101476aeeb6fea291060ff0b536e5761766ba2d7a60facdea6

  • SHA512

    14ac4a17869bb546b58ace488c9d5d14df7fc3ddeb40b9dd26529bcff132cf6c6fdcd7a601080058f9b51f83528123823f0a413adf7904377480b6cdee5095a6

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://cutt.ly/8jmDPVb

Targets

    • Target

      order_receipt.xls

    • Size

      276KB

    • MD5

      66ca579b793dc4367aba256fa62f9bf2

    • SHA1

      deb4047fdd1b203d4202cc716df2d01a35730229

    • SHA256

      1c01354cd22e2e101476aeeb6fea291060ff0b536e5761766ba2d7a60facdea6

    • SHA512

      14ac4a17869bb546b58ace488c9d5d14df7fc3ddeb40b9dd26529bcff132cf6c6fdcd7a601080058f9b51f83528123823f0a413adf7904377480b6cdee5095a6

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

2
T1158

Defense Evasion

Hidden Files and Directories

2
T1158

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks