Resubmissions

25-02-2021 13:17

210225-n5xj9bmhgx 10

25-02-2021 12:04

210225-d7yfj8lsqx 10

25-02-2021 09:22

210225-lx1lgelm6j 10

General

  • Target

    Cancellation_Letter_652756670-02242021.xls

  • Size

    144KB

  • Sample

    210225-d7yfj8lsqx

  • MD5

    241c5067481fc70f56aafcd73d11fcfb

  • SHA1

    12639f46358f960aa7c75582bf46b0f983ecf6c7

  • SHA256

    4308d271f422311004ba2b303296721ce9bbbc230c41677c9c9d0227cd46bfcb

  • SHA512

    2f36a4ebe0c852b8eb19cf56e09fd36331d490b71a2dc63e51ca9e7aca49ef8f4ae8aada56506d10f27a64b912c2357e256860cdb7951ebc9a0117bea3875025

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://eventpeople.pro/cfuizfotpz/44252505664004600000.dat

xlm40.dropper

http://ledia.shop:80/dwwzeqw/44252505664004600000.dat

xlm40.dropper

http://jttires.com/ykcfoknw/44252505664004600000.dat

xlm40.dropper

http://dnvillas.com/ncmlzqphuqma/44252505664004600000.dat

xlm40.dropper

http://meta.group/ffbupgnegjy/44252505664004600000.dat

Targets

    • Target

      Cancellation_Letter_652756670-02242021.xls

    • Size

      144KB

    • MD5

      241c5067481fc70f56aafcd73d11fcfb

    • SHA1

      12639f46358f960aa7c75582bf46b0f983ecf6c7

    • SHA256

      4308d271f422311004ba2b303296721ce9bbbc230c41677c9c9d0227cd46bfcb

    • SHA512

      2f36a4ebe0c852b8eb19cf56e09fd36331d490b71a2dc63e51ca9e7aca49ef8f4ae8aada56506d10f27a64b912c2357e256860cdb7951ebc9a0117bea3875025

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks