General

  • Target

    Debt-Details-496696432-02252021.zip

  • Size

    28KB

  • Sample

    210225-elcw8lm1wn

  • MD5

    c3211edc7a641a00b48884c8029b51bf

  • SHA1

    8b141a7d5ab272ed3dd3359f3f491b0483a371e1

  • SHA256

    d764eef3ffbef064a9778c792dcdca74330996320e0abd4a77ca8817a09afbbe

  • SHA512

    1e6c72a602fd21963c27e902f91d23248afabecf1133fa9ac6a2c6aa8289166a56020dc40b633601742450bca0bb2c046030e4b9feee423b9ffb49c003b7a068

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://oxcoz.com/nydprgwf/44252859150694400000.dat

xlm40.dropper

http://sharonbrockway.com/favohwn/44252859150694400000.dat

xlm40.dropper

http://outgrowmeinie.com/wcuiugnrebpk/44252859150694400000.dat

xlm40.dropper

http://sarayutseena-001-site1.gtempurl.com/kecljmkhyl/44252859150694400000.dat

xlm40.dropper

http://gtrans.group/prduod/44252859150694400000.dat

Targets

    • Target

      Debt-Details-496696432-02252021.xls

    • Size

      144KB

    • MD5

      869704ac772cc368bb52181138176754

    • SHA1

      6150853c4becd74cba2a328aaa6914de141fdc06

    • SHA256

      936f988eab44609ca98b34312e1e8c67b533f3413693b5fa8c545b34b724c9c2

    • SHA512

      b469efb98ad21c3268f4bc004a55579383ec0bff4023d8b729e1ad5559357081f402b83505cbfd52716344c416d10df79dcc46725dfbe268a6d0a53c1ce8a3f9

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks