General

  • Target

    document-1915351743.xls

  • Size

    88KB

  • Sample

    210222-rrhwdgmfqe

  • MD5

    976d437fbf1c1598413411d366092cb6

  • SHA1

    ab1c382ec0a25bd9881eee9a3401c9e1b78ee4e5

  • SHA256

    21944a6a3c05598d1cdc6893c982e22d81344ff8bc8225811691512976aa6bcc

  • SHA512

    f77580c1307c71dcbdfb2ee9d0d5bac506929f66b5c98f0e42f55f066b5da8aeaafb3db74eda4fb0cde1dd2d220dbef5a3ffb354b0a31314216f94f654a88eec

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://miraclecollagen.co.za/ds/1802.gif

Targets

    • Target

      document-1915351743.xls

    • Size

      88KB

    • MD5

      976d437fbf1c1598413411d366092cb6

    • SHA1

      ab1c382ec0a25bd9881eee9a3401c9e1b78ee4e5

    • SHA256

      21944a6a3c05598d1cdc6893c982e22d81344ff8bc8225811691512976aa6bcc

    • SHA512

      f77580c1307c71dcbdfb2ee9d0d5bac506929f66b5c98f0e42f55f066b5da8aeaafb3db74eda4fb0cde1dd2d220dbef5a3ffb354b0a31314216f94f654a88eec

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks