General

  • Target

    Debt-Details-1623009831-02252021.zip

  • Size

    28KB

  • Sample

    210225-ytfkx9qnfs

  • MD5

    031303e02cfd167a9c2dcc01fbad823a

  • SHA1

    dadc7634bfc015366d50bd0ad2c4a12a70e24121

  • SHA256

    6acbea97fb49788d2ca469a7902c1656f89c9fbfb3a71d97e65baaedcc5d1204

  • SHA512

    19c14d5ea3e9d33f6697baeaa3a7274b45a0cdce8794c35c6c247ddd904b64db23a41686499398152b6275eb9a6defdffc1fe18842954a67fc8dc9a9b2f0e23d

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://oxcoz.com/nydprgwf/44252811658217600000.dat

xlm40.dropper

http://sharonbrockway.com/favohwn/44252811658217600000.dat

xlm40.dropper

http://outgrowmeinie.com/wcuiugnrebpk/44252811658217600000.dat

xlm40.dropper

http://sarayutseena-001-site1.gtempurl.com/kecljmkhyl/44252811658217600000.dat

xlm40.dropper

http://gtrans.group/prduod/44252811658217600000.dat

Targets

    • Target

      Debt-Details-1623009831-02252021.xls

    • Size

      144KB

    • MD5

      7f615b0c440f034c2ceb9e3b0b4c8660

    • SHA1

      5dce52706e34842b705c02b4c7c5d84ffbfc58b7

    • SHA256

      feae9a910cc7ebda34d8b7d0953203725a109e3f14f3a47c05e95ecd79ec9114

    • SHA512

      6697fde58124536442b9b28938906a625e67015bc56670c1c4eabbfce0e7af14a9a2a81817792732a2a9a26959383d24211aa7d4509e332f8e475d2a2bc96337

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks