General

  • Target

    request_form_1611306935.xlsm

  • Size

    16KB

  • Sample

    210122-g5fnsx7wn2

  • MD5

    5fd958006a94c6145364c06bbf264d06

  • SHA1

    d5cc7dc1083508dbe5531db67a3f78866e00330c

  • SHA256

    f41c4588d2ef8936d9417069a1c5a44833fb2994c60c54bda14b1aac9aa7b83a

  • SHA512

    a8c80661725284a629ec45f25331ea1349f63f4ea8245ae6c6fb62b9e3ac6114889c6b909c34332acd403ac7f0448a1692165b888aa8f7c4fa0ef8fbb404c0d9

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://jvdattorney.com/stager/babmboa.php

Targets

    • Target

      request_form_1611306935.xlsm

    • Size

      16KB

    • MD5

      5fd958006a94c6145364c06bbf264d06

    • SHA1

      d5cc7dc1083508dbe5531db67a3f78866e00330c

    • SHA256

      f41c4588d2ef8936d9417069a1c5a44833fb2994c60c54bda14b1aac9aa7b83a

    • SHA512

      a8c80661725284a629ec45f25331ea1349f63f4ea8245ae6c6fb62b9e3ac6114889c6b909c34332acd403ac7f0448a1692165b888aa8f7c4fa0ef8fbb404c0d9

    Score
    10/10
    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

4
T1082

Tasks