General

  • Target

    Cancellation_Letter_217264958-02242021.xls

  • Size

    144KB

  • Sample

    210224-mfpyzwxt2x

  • MD5

    389468f5a4fe1158686489601158c933

  • SHA1

    0bc2d33169724e8783b16b7ac4cf3664b8110ee0

  • SHA256

    4c6dcbefc272d8ff6cd6276398c960c1f765219b62bfc299289e90f38e8f34cc

  • SHA512

    fcebe3686bd601bfa5dec9e8a5c766ad8ebc5ca5568c429ed436505a0af08a1dffca30e3aa6d5ff7d8ee3558ba0f86584ab2c7e76005d5ac9a2c66efc384df50

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://eventpeople.pro/cfuizfotpz/44251796295601900000.dat

xlm40.dropper

http://ledia.shop:80/dwwzeqw/44251796295601900000.dat

xlm40.dropper

http://jttires.com/ykcfoknw/44251796295601900000.dat

xlm40.dropper

http://dnvillas.com/ncmlzqphuqma/44251796295601900000.dat

xlm40.dropper

http://meta.group/ffbupgnegjy/44251796295601900000.dat

Targets

    • Target

      Cancellation_Letter_217264958-02242021.xls

    • Size

      144KB

    • MD5

      389468f5a4fe1158686489601158c933

    • SHA1

      0bc2d33169724e8783b16b7ac4cf3664b8110ee0

    • SHA256

      4c6dcbefc272d8ff6cd6276398c960c1f765219b62bfc299289e90f38e8f34cc

    • SHA512

      fcebe3686bd601bfa5dec9e8a5c766ad8ebc5ca5568c429ed436505a0af08a1dffca30e3aa6d5ff7d8ee3558ba0f86584ab2c7e76005d5ac9a2c66efc384df50

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks