General

  • Target

    87e8ff5c51e0.xls

  • Size

    158KB

  • Sample

    210115-2vj8v4m2ax

  • MD5

    04a46485279f405f5595d277c72a25a4

  • SHA1

    8f1c1271643056d89b91815bc72a61b3da3b589f

  • SHA256

    26a30f206cc208fe56172c6465deba73b66668a092a4dbc1a5ae04b1907c2135

  • SHA512

    e56fc8efdf0f0356d79a4c646583768f687d75f3f6bafe5c4cc860fe11a096a5e42030dc75b4642fed05818c85a342e4f1a20ee0ccfea5733fd0743db56dd9a2

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://tinyurl.com/yxd46z2p

Targets

    • Target

      87e8ff5c51e0.xls

    • Size

      158KB

    • MD5

      04a46485279f405f5595d277c72a25a4

    • SHA1

      8f1c1271643056d89b91815bc72a61b3da3b589f

    • SHA256

      26a30f206cc208fe56172c6465deba73b66668a092a4dbc1a5ae04b1907c2135

    • SHA512

      e56fc8efdf0f0356d79a4c646583768f687d75f3f6bafe5c4cc860fe11a096a5e42030dc75b4642fed05818c85a342e4f1a20ee0ccfea5733fd0743db56dd9a2

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks