General

  • Target

    Attachment_78216.xlsb

  • Size

    94KB

  • Sample

    210224-znk3gmdjxs

  • MD5

    51f9bfaf150751080cbae13b7f735f64

  • SHA1

    eda977f3a0adc285c5d53c0668a74a8b46db5c2e

  • SHA256

    b1053de19f619325d6c83395ac3f5d56376216ac142472a1f2a5471b205ccc27

  • SHA512

    69592d73b02638f51e2d5d10aaae6e4b09aeaaf33174ad67e035aceefe1a1ff71254f8fe9c97452e8d81c6d833e07f84c455ec710033cc6a0108a09a22e3c057

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://139.162.167.231/campo/t2/t2

Targets

    • Target

      Attachment_78216.xlsb

    • Size

      94KB

    • MD5

      51f9bfaf150751080cbae13b7f735f64

    • SHA1

      eda977f3a0adc285c5d53c0668a74a8b46db5c2e

    • SHA256

      b1053de19f619325d6c83395ac3f5d56376216ac142472a1f2a5471b205ccc27

    • SHA512

      69592d73b02638f51e2d5d10aaae6e4b09aeaaf33174ad67e035aceefe1a1ff71254f8fe9c97452e8d81c6d833e07f84c455ec710033cc6a0108a09a22e3c057

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks