General

  • Target

    document (77).zip

  • Size

    15KB

  • Sample

    210225-jdvsek4lqx

  • MD5

    7e40e504ccfa028ba46fb76d5fce8217

  • SHA1

    4dbb967a1e7fc26cf02f931e2e0a65c710bde756

  • SHA256

    63ef2e6726e2288b480cd3530aabe862b5d0729af91e3298c1a801f156295181

  • SHA512

    9f754f09e0c26aa8180ac3e057d8bc31535515b81bd3216bb5c347b059fc0a21c617545a45792a6f8fcf93247a5311df1699476400614053857577295bf0f9cb

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://fb25d3as23hy.com/fb26.gif

Targets

    • Target

      document-529287208.xls

    • Size

      88KB

    • MD5

      6e5a4d28fb8b824219b30f8e6fa4d1a0

    • SHA1

      c6ba61ced5a2211e3ceccdc5ece4572c99cb5a8d

    • SHA256

      dd2f41ab3b2a58861f33c19d8ba5ae950f3b8bc34996630467d040a59a78a038

    • SHA512

      8c1c93ba68868478a37fc7f7bb4672e5c9c55bd2454c1748916c24f5df875db0ad20c91150d6742b49791a9a0061656c0fbd73d4409a19cf6e176b0ab3e95eb9

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks