General

  • Target

    offer for best price.xlsx

  • Size

    377KB

  • Sample

    210122-tjbskdblr2

  • MD5

    7acb989fd7d1eaa72980f95224c174e9

  • SHA1

    2c80a727d63c077ad321ec1033583d2b095001c3

  • SHA256

    95db03a58cdcefa4264f14067fbb6f9a3b3278cd447216eefe29f292c899c6cc

  • SHA512

    b16f522e06baa46c44b91cbf2aab5d19bfedab4fb01727833762dbfc35dbfe8aa5a1f93c3150440c26856d348a8c1873a005d32e9c7de776bb77b43f2dea11bb

Score
5/10

Malware Config

Targets

    • Target

      offer for best price.xlsx

    • Size

      377KB

    • MD5

      7acb989fd7d1eaa72980f95224c174e9

    • SHA1

      2c80a727d63c077ad321ec1033583d2b095001c3

    • SHA256

      95db03a58cdcefa4264f14067fbb6f9a3b3278cd447216eefe29f292c899c6cc

    • SHA512

      b16f522e06baa46c44b91cbf2aab5d19bfedab4fb01727833762dbfc35dbfe8aa5a1f93c3150440c26856d348a8c1873a005d32e9c7de776bb77b43f2dea11bb

    Score
    5/10
    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks