General

  • Target

    notif9551.xls

  • Size

    31KB

  • Sample

    210120-xdr1f1wvfa

  • MD5

    8892f7bf793c729f1367f8fd0b89371d

  • SHA1

    b491215ec214dcd8d8a37273d186d26da784ea17

  • SHA256

    1a457bbc6c53f2977963f9a5a10d6d0ef97bdc96c9dc3826aa41743376e854b6

  • SHA512

    b2940379f36dcc1eb2d2ca54b9559daa55b40199b6d3041167301f4c29e8ff336d27b96f718e3fd5dbec2d8ffcfd6d1829ebf10d2a7412d09400dfa13adc8abe

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://ezucycam.com/k.php

Targets

    • Target

      notif9551.xls

    • Size

      31KB

    • MD5

      8892f7bf793c729f1367f8fd0b89371d

    • SHA1

      b491215ec214dcd8d8a37273d186d26da784ea17

    • SHA256

      1a457bbc6c53f2977963f9a5a10d6d0ef97bdc96c9dc3826aa41743376e854b6

    • SHA512

      b2940379f36dcc1eb2d2ca54b9559daa55b40199b6d3041167301f4c29e8ff336d27b96f718e3fd5dbec2d8ffcfd6d1829ebf10d2a7412d09400dfa13adc8abe

    Score
    10/10
    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks