General

  • Target

    this_challenge (18).zip

  • Size

    15KB

  • Sample

    210225-xn78vp8w5a

  • MD5

    5f2a6a2ace3b147206781f71834a7c1d

  • SHA1

    2672433e469f1762724356b368e43108d95fd949

  • SHA256

    7a10acd0c776d83e34caec62b139942f95430e4e2639227b211f8584d62f2aa4

  • SHA512

    9516ff6b57fdb96530f970359e6b6c6e454bdee7ca32350152e8eab9ed1fdcbdd79580c9a4f4a5a28415912938dc7250fb0aac45a44bd9e1e4db0306f27c54ec

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://fb25d3a23hy.com/fb26.gif

Targets

    • Target

      document-1040505314.xls

    • Size

      88KB

    • MD5

      5d45d65e828f70f102ad6031d7ecbcbe

    • SHA1

      10b4b537cf7bce190d98c7379251979ce8b39358

    • SHA256

      d07a55e344783ea610fb98a8b66cf4c4c00083c1442971550ca685ce3b95a4d2

    • SHA512

      dbb1ebeced187bdd2fd22827d0ed42a3e7798f874ca2597b9140cb9a35d6e7df0c37be4c0f7d6356597174483337b32623b472010b4d6851aa71d272cd16d821

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks