General

  • Target

    document-1433499550.xls

  • Size

    90KB

  • Sample

    210224-rm735t85dj

  • MD5

    f5b58a4e2f658dbaec29b354e4fb932e

  • SHA1

    1b109d9910c5c1e0933127e17dd3fd338fb7ec3b

  • SHA256

    a453af130dea2407e2400ec20cc906ba07e5fde9d8f1a51a65ecfd4528533593

  • SHA512

    c7caa0ac1f8eddbd8bfe792a351d2a30c0c31a3b350438a90b9a18d4a38e16513ea14fc54ecb07022b38b1acf1ec352ac6a9b71ecc1b023bd6ac86ea9f3a89fd

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://31.214.157.206/22.gif

Targets

    • Target

      document-1433499550.xls

    • Size

      90KB

    • MD5

      f5b58a4e2f658dbaec29b354e4fb932e

    • SHA1

      1b109d9910c5c1e0933127e17dd3fd338fb7ec3b

    • SHA256

      a453af130dea2407e2400ec20cc906ba07e5fde9d8f1a51a65ecfd4528533593

    • SHA512

      c7caa0ac1f8eddbd8bfe792a351d2a30c0c31a3b350438a90b9a18d4a38e16513ea14fc54ecb07022b38b1acf1ec352ac6a9b71ecc1b023bd6ac86ea9f3a89fd

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks