General

  • Target

    necessary (51).zip

  • Size

    15KB

  • Sample

    210219-kdxm68qq3j

  • MD5

    3d910ff043419343197ef713453f4c82

  • SHA1

    04a11bb2e9cd2eea0c36269970c0f36e6c4b88c3

  • SHA256

    24680fb073764d984de04f2a155fc60c31430ee1a9bce0c54804f0adf03360dd

  • SHA512

    4b49d794858aacc5c193c5ddbb40f299d3ee084d393eb9ea0e5b18ea97d7f438ef992ef08c388a57f4ea8e2ec8355ae425b21c8996568026808e8f121c052253

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://shoblasaathitrust.org/ds/1902.gif

Targets

    • Target

      document-456729512.xls

    • Size

      89KB

    • MD5

      a8e0711f4830dab7290abfed3b1da8ce

    • SHA1

      9b70491a41af61bca2fb54e4f75c58fac4575d16

    • SHA256

      97999314846a57df638bb3d014c18adf19802739cc637bb68564341cc1e1ded5

    • SHA512

      d1ccb304fd4b048754eae2487109f50e70c696278f11108fac6fbb0362fa2f52ec4a0b6f38a320c0332ad051291e060a93782078a374e5c4865387a4ef82347e

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks