General

  • Target

    document-626482401.xls

  • Size

    88KB

  • Sample

    210225-aq1hsqb1wa

  • MD5

    02ad5bdbd5b12fba203bc0454592c24b

  • SHA1

    8b4320ac40ac141792af2dc804d1e43efa065e83

  • SHA256

    08ec12f9623e7bcdbeea54a707a4f7dc6fbcac02fcd02bf04f21d0d05bc638b5

  • SHA512

    653678a1094c02f894c69e063504895166592214da841ebd29309e1bd98321d94068bfe03b3e839b9ff23d84902dce5b141e11fd485c662d1c0078c26f034ec6

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://fb25d3a23hy.com/fb26.gif

Targets

    • Target

      document-626482401.xls

    • Size

      88KB

    • MD5

      02ad5bdbd5b12fba203bc0454592c24b

    • SHA1

      8b4320ac40ac141792af2dc804d1e43efa065e83

    • SHA256

      08ec12f9623e7bcdbeea54a707a4f7dc6fbcac02fcd02bf04f21d0d05bc638b5

    • SHA512

      653678a1094c02f894c69e063504895166592214da841ebd29309e1bd98321d94068bfe03b3e839b9ff23d84902dce5b141e11fd485c662d1c0078c26f034ec6

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks