General

  • Target

    rechnung_66.xlsm

  • Size

    76KB

  • Sample

    210224-75r9rnlc4s

  • MD5

    9f8f23acbdff14fe398ebb205403186b

  • SHA1

    2e16a1559c43482fb90c033f50f06547a708cc85

  • SHA256

    81ed52b62676839441041e6606d9a8dcf7598e885337b5247c69d4afcc3abccf

  • SHA512

    448fb7662af74b8fd705c2b7d4fcb8767de76e51a139f10009795c5f235ebde17c8df586e163530ceefb55aa1565494bf13570ca94f885620fcfe7ec19f2ea6b

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://addledsteamb.xyz/BAYgODA0NUQ2OEY1RTA2ODg4RDhCQzlEQzRBRUU3QTA5OUI=

Targets

    • Target

      rechnung_66.xlsm

    • Size

      76KB

    • MD5

      9f8f23acbdff14fe398ebb205403186b

    • SHA1

      2e16a1559c43482fb90c033f50f06547a708cc85

    • SHA256

      81ed52b62676839441041e6606d9a8dcf7598e885337b5247c69d4afcc3abccf

    • SHA512

      448fb7662af74b8fd705c2b7d4fcb8767de76e51a139f10009795c5f235ebde17c8df586e163530ceefb55aa1565494bf13570ca94f885620fcfe7ec19f2ea6b

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks