General

  • Target

    document-1019153116.xls

  • Size

    89KB

  • Sample

    210222-fkxm6wpl2n

  • MD5

    948a7b1bc28afb293a7f3fe933e11b83

  • SHA1

    8f858737a636e731b1b1220fd80d3234052fdf98

  • SHA256

    4e657cfccf1d18b8166a8adb446bf8cf82e4ad20c178689c3cb872ca1b059092

  • SHA512

    cee16e7286ac47086a5432b7866d6295e2baa7f081784cb8149379d327d884eaf7b434bc8d2dd6c4d0eaaf4178eb7fcb88ed9f5a49300f00fedc8989898df622

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://marknadsundersokning.nu/ds/1902.gif

Targets

    • Target

      document-1019153116.xls

    • Size

      89KB

    • MD5

      948a7b1bc28afb293a7f3fe933e11b83

    • SHA1

      8f858737a636e731b1b1220fd80d3234052fdf98

    • SHA256

      4e657cfccf1d18b8166a8adb446bf8cf82e4ad20c178689c3cb872ca1b059092

    • SHA512

      cee16e7286ac47086a5432b7866d6295e2baa7f081784cb8149379d327d884eaf7b434bc8d2dd6c4d0eaaf4178eb7fcb88ed9f5a49300f00fedc8989898df622

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks