General

  • Target

    attached (49).zip

  • Size

    15KB

  • Sample

    210224-e953sx345j

  • MD5

    06ab501e1dfc90a5934447deac6583ac

  • SHA1

    f38005d48f5e29f810ee36f5556e1ae1bc032c88

  • SHA256

    7c3d0cd8b4bff1ebf1cdce8cb0413bec6cd68c6580f9708f8257d3babd1820eb

  • SHA512

    a468c3b6aae2c07d3656d5dd50e06dcfd5af9240227ddd769a3fac8145575546d81de44c7f00ffa268bebfdba1bbb7c9f75845dc1c2643d91e4db09100010e0c

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://37.10.71.99/22.gif

Targets

    • Target

      document-1444787431.xls

    • Size

      90KB

    • MD5

      3561877f0685930b467f49e00e1f5265

    • SHA1

      d70ac9e9f8d3d7f71886e5204468e431ebff4538

    • SHA256

      96cf591ab3eb5ca14724c2ed5084a21ef64608d1f54a866f7fad15d013306213

    • SHA512

      176914efb16b793293325042a456b72e3f53fbaf4dae140b3cfc34523bfd3e35467ce44681cc5d48da6b99071a0857a3f8c41191b54e24d03b7a277390242a19

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks