General

  • Target

    Debt-Details-23003471-02252021.xls

  • Size

    144KB

  • Sample

    210225-n33car76qj

  • MD5

    bf0b71cf808586bee3af59a0d77a9462

  • SHA1

    68f96881b43a561fe883add155ed66bfc62cff5e

  • SHA256

    2392bab41b1bd16e682b954f11928c53ba1d45c346ad0c095433214dd0390507

  • SHA512

    9a4d2c414f676f2a3cc4cf8f3f28533a531815ff2d24736f064df65f696221cec3835ed74080118e10a10f0eba8fa036b23dd5ad319c247d0073b0874117e8e9

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://oxcoz.com/nydprgwf/44252825457986100000.dat

xlm40.dropper

http://sharonbrockway.com/favohwn/44252825457986100000.dat

xlm40.dropper

http://outgrowmeinie.com/wcuiugnrebpk/44252825457986100000.dat

xlm40.dropper

http://sarayutseena-001-site1.gtempurl.com/kecljmkhyl/44252825457986100000.dat

xlm40.dropper

http://gtrans.group/prduod/44252825457986100000.dat

Targets

    • Target

      Debt-Details-23003471-02252021.xls

    • Size

      144KB

    • MD5

      bf0b71cf808586bee3af59a0d77a9462

    • SHA1

      68f96881b43a561fe883add155ed66bfc62cff5e

    • SHA256

      2392bab41b1bd16e682b954f11928c53ba1d45c346ad0c095433214dd0390507

    • SHA512

      9a4d2c414f676f2a3cc4cf8f3f28533a531815ff2d24736f064df65f696221cec3835ed74080118e10a10f0eba8fa036b23dd5ad319c247d0073b0874117e8e9

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks