General

  • Target

    254840536256708365.xls

  • Size

    106KB

  • Sample

    210224-6eq8adq182

  • MD5

    55ba3916ea9a011629299b8e22b98a5e

  • SHA1

    06bafc08eeeb7285631ef678c34108d7e73473fa

  • SHA256

    46ddecbf4398ad5a3da87343d2c4033fd54dd8ecca4a66954b81622f822cb3f0

  • SHA512

    3921ec370745370837fcbd5d1f59ad01484d91835b72a0449f28a7c84b12fac51897d8909ffb055c3ee6f6dc1425a1b350fc7120702fde9053b125c7add20d22

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://statssale.com/header.jpg

Targets

    • Target

      254840536256708365.xls

    • Size

      106KB

    • MD5

      55ba3916ea9a011629299b8e22b98a5e

    • SHA1

      06bafc08eeeb7285631ef678c34108d7e73473fa

    • SHA256

      46ddecbf4398ad5a3da87343d2c4033fd54dd8ecca4a66954b81622f822cb3f0

    • SHA512

      3921ec370745370837fcbd5d1f59ad01484d91835b72a0449f28a7c84b12fac51897d8909ffb055c3ee6f6dc1425a1b350fc7120702fde9053b125c7add20d22

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks