General

  • Target

    Cancellation_Letter_1389392401-02242021.zip

  • Size

    28KB

  • Sample

    210225-a28ta9n2qj

  • MD5

    63dccc05560dbcd7f5adc7876dcdc49c

  • SHA1

    a09786e2fbf64bee71ac82cdd86b4662ef86fa06

  • SHA256

    87a8737ea8c732ff3563b82232387ca5937f35abda81c8bef28998ecda5c8ea8

  • SHA512

    093ad0ad894b6b0aded509b335d5bbc6c1807f0184f35044883a50bbcc70e9f7a0000ac18ebeac7be7c733e115624628cb70c9ac12442074f3a3dc0d0b27a751

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://slmtv.com/tfbgl/44252628012615700000.dat

xlm40.dropper

http://dicomm-001-site35.ctempurl.com/pmslsda/44252628012615700000.dat

xlm40.dropper

http://konyahaberler.xyz/hxjxxwav/44252628012615700000.dat

xlm40.dropper

http://pandsquinny.com/nlbzyhfs/44252628012615700000.dat

xlm40.dropper

http://www.kunjincompany.com/anesrq/44252628012615700000.dat

Targets

    • Target

      Cancellation_Letter_1389392401-02242021.xls

    • Size

      144KB

    • MD5

      6a30fe578407419fa258c84b3d7c5614

    • SHA1

      63938fdbdeb9686c5a1b9f377647b3684f4917ee

    • SHA256

      e1cf1f8c3bb8f7db22d41062e109f835b8afe5384312b60002c702b419fd4c9c

    • SHA512

      acca082c04b4e69ecf971ed275cd1412d7b46b8887d0484b309bd954550b42625786e3f9471dde64ed6badb6aed89bbfe37ee02017665acdba26d4644bf9db71

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks