Resubmissions

12-02-2021 00:38

210212-3lvfbc5xrs 10

12-02-2021 00:37

210212-4kxvgclptx 10

12-02-2021 00:24

210212-kvmnnj48me 10

General

  • Target

    Attachment_65307.xlsb

  • Size

    106KB

  • Sample

    210212-4kxvgclptx

  • MD5

    3827cfd0b93d8d87c434a774782e434a

  • SHA1

    1aff5b6db02cb808b41216e4bc4aeed1ef63b4d5

  • SHA256

    4513c7bf3eba413e076d4e091bd3d88284644f2f051b9ebfdd537f982ddd6e61

  • SHA512

    6e7bee5ba20655dcfd561db2c18409c7b72d8b84526efcff36a116565441922a880bfda071f24127cac43289c9ece12a98ff23d31ef91912e50c6d148f9e792b

Score
10/10

Malware Config

Targets

    • Target

      Attachment_65307.xlsb

    • Size

      106KB

    • MD5

      3827cfd0b93d8d87c434a774782e434a

    • SHA1

      1aff5b6db02cb808b41216e4bc4aeed1ef63b4d5

    • SHA256

      4513c7bf3eba413e076d4e091bd3d88284644f2f051b9ebfdd537f982ddd6e61

    • SHA512

      6e7bee5ba20655dcfd561db2c18409c7b72d8b84526efcff36a116565441922a880bfda071f24127cac43289c9ece12a98ff23d31ef91912e50c6d148f9e792b

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks