General

  • Target

    Complaint-447781983-02182021.xls

  • Size

    142KB

  • Sample

    210223-cyxhcb2taa

  • MD5

    60f845a847e771a59b97d456c494f69d

  • SHA1

    bf79e4535e5d15cfbd4c6eb2fa2d086703ad81d6

  • SHA256

    c44df560766b2a3f60adba4ef6448e266a3036e19fc1631ae9ada22628447319

  • SHA512

    e942975e9b88c1e3783fa7723b8dcaf4cf1acc63e36380a56543ab96393815df27426169d38235790314de18590b0ed1363d38296e3b4a5543dba0f849f103e0

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://rzminc.com/xklyulyijvn/44250556753935200000.dat

xlm40.dropper

http://pathinanchilearthmovers.com/eznwcdhx/44250556753935200000.dat

xlm40.dropper

http://jugueterialatorre.com.ar/xjzpfwc/44250556753935200000.dat

xlm40.dropper

http://rzminc.com/fdzgprclatqo/44250556753935200000.dat

xlm40.dropper

http://biblicalisraeltours.com/otmchxmxeg/44250556753935200000.dat

Targets

    • Target

      Complaint-447781983-02182021.xls

    • Size

      142KB

    • MD5

      60f845a847e771a59b97d456c494f69d

    • SHA1

      bf79e4535e5d15cfbd4c6eb2fa2d086703ad81d6

    • SHA256

      c44df560766b2a3f60adba4ef6448e266a3036e19fc1631ae9ada22628447319

    • SHA512

      e942975e9b88c1e3783fa7723b8dcaf4cf1acc63e36380a56543ab96393815df27426169d38235790314de18590b0ed1363d38296e3b4a5543dba0f849f103e0

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks