Resubmissions

14-04-2021 05:08

210414-2h2gjv4lte 10

15-01-2021 07:27

210115-psaae3dxjj 10

27-10-2020 21:10

201027-xsnh8cl69j 10

General

  • Target

    8272133.xlsb

  • Size

    84KB

  • Sample

    210115-psaae3dxjj

  • MD5

    6df494468bdd94b1748fc514bbfdf784

  • SHA1

    d7e2ae2fea1f1bbf8f677f431bd98a39c4bc8039

  • SHA256

    5b8a82fc7209d40dff72c6e53a9cd35f66f2eef949e6cc84c5f24049a1b12a80

  • SHA512

    86fd1323fcb150bf0b85a221d5f5f29d576dfd00b609a34323149c0e4469697ee4226208332311513457186fbb1d94cd5fb6fc5627e8b4a8969b77de31a541e1

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      8272133.xlsb

    • Size

      84KB

    • MD5

      6df494468bdd94b1748fc514bbfdf784

    • SHA1

      d7e2ae2fea1f1bbf8f677f431bd98a39c4bc8039

    • SHA256

      5b8a82fc7209d40dff72c6e53a9cd35f66f2eef949e6cc84c5f24049a1b12a80

    • SHA512

      86fd1323fcb150bf0b85a221d5f5f29d576dfd00b609a34323149c0e4469697ee4226208332311513457186fbb1d94cd5fb6fc5627e8b4a8969b77de31a541e1

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks