General

  • Target

    file (17).zip

  • Size

    15KB

  • Sample

    210224-9spycb7wtj

  • MD5

    663662349134e7ce3eed0a56db009fac

  • SHA1

    7850adc7ef04e304597f2f1c92392f752c84a91f

  • SHA256

    46c52aea305057c75e7bb2537b535a3616071ea0887518ece70ef1f1e5fc0f1f

  • SHA512

    3a76777096d1b35d2b1d39e54041c60726e21fe57f5d80ea247285d2462d6f1707037cf371e48a727afe899a0c684ac17c71fe6800ef234838fb83c2d7cf65bd

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://31.214.157.170/22.gif

Targets

    • Target

      document-1549008713.xls

    • Size

      90KB

    • MD5

      ff1cb95e9037762f726f9485db9eff12

    • SHA1

      cfe3fdca0bc87f49788f75d872a56ed1842a02c5

    • SHA256

      d64cc2ecc4cff3b0cd2d55dac173f57cb2dafd2e36e850c73b2c125197aca954

    • SHA512

      b10677b6016699ce43f800c92360efc916649166cf0668f740abddf8b1c3e05bc29d53ae4dca2ffc40e9f977ff33b8a65e012c12b4383850647798176b9140ee

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks