General

  • Target

    document-452349990.xls

  • Size

    88KB

  • Sample

    210226-9ey9vf48ps

  • MD5

    59bf78d1a45d1d31be4e3e2bb1b6474a

  • SHA1

    7b585c4aa4dd542f0d5bae743cca4ca36fdec30f

  • SHA256

    757858aead8b3923c93b4bc6409a8a3bbebc1c68645fa879fe34e48798c2f3bf

  • SHA512

    5ae745a8c6046227969fd2cb21078714abffd3201e757773c978fb3915fd0f2f3a32590e25c1330f066b3177d9716914339f6272c20e9beb6a01d853177b0df3

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://fb25d3a23hy.com/fb26.gif

Targets

    • Target

      document-452349990.xls

    • Size

      88KB

    • MD5

      59bf78d1a45d1d31be4e3e2bb1b6474a

    • SHA1

      7b585c4aa4dd542f0d5bae743cca4ca36fdec30f

    • SHA256

      757858aead8b3923c93b4bc6409a8a3bbebc1c68645fa879fe34e48798c2f3bf

    • SHA512

      5ae745a8c6046227969fd2cb21078714abffd3201e757773c978fb3915fd0f2f3a32590e25c1330f066b3177d9716914339f6272c20e9beb6a01d853177b0df3

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks