General

  • Target

    n°761.xls

  • Size

    154KB

  • Sample

    210119-r78rncmbzx

  • MD5

    d24625e30b351be950a8d709b77871a7

  • SHA1

    292bb6d374398c746722924b209fc043bf0e47a2

  • SHA256

    1d68434b591110cdabe1af690f1a01dc209ceb432eb7b89b24e3d5c9f43d3338

  • SHA512

    7c487b201c23ce68660e2ee191d2f2d45544efb4cfc08e7fac8ec9ac79c7cf3b1ecf51caaa47f5b111d3f85adbff3f34c30683ef45bcef645cd285657c432662

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://cutt.ly/fjYtydH

Targets

    • Target

      n°761.xls

    • Size

      154KB

    • MD5

      d24625e30b351be950a8d709b77871a7

    • SHA1

      292bb6d374398c746722924b209fc043bf0e47a2

    • SHA256

      1d68434b591110cdabe1af690f1a01dc209ceb432eb7b89b24e3d5c9f43d3338

    • SHA512

      7c487b201c23ce68660e2ee191d2f2d45544efb4cfc08e7fac8ec9ac79c7cf3b1ecf51caaa47f5b111d3f85adbff3f34c30683ef45bcef645cd285657c432662

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks