document-1955896638.xls

General
Target

document-1955896638.xls

Size

85KB

Sample

210302-1lphqmv2px

Score
10 /10
MD5

66e5e724f99a77455e36bca858366e5b

SHA1

aad43897bccde3be594cf89863341050b6eed55a

SHA256

16a0c2f741a14c423b7abe293e26f711fdb984fc52064982d874bf310c520b12

SHA512

e96dd67971cd9e55d37278e65f59060a1f708dc2d841d6aae02bc5440a3c99dc5fcfbebc98b68fea928b4df52ca59679d03af1dca06c553a2fe68a884b056571

Malware Config

Extracted

Language xlm4.0
Source
URLs
xlm40.dropper

http://kfzhm28pwzrlk02bmjy.com/mrch.gif

Targets
Target

document-1955896638.xls

MD5

66e5e724f99a77455e36bca858366e5b

Filesize

85KB

Score
10 /10
SHA1

aad43897bccde3be594cf89863341050b6eed55a

SHA256

16a0c2f741a14c423b7abe293e26f711fdb984fc52064982d874bf310c520b12

SHA512

e96dd67971cd9e55d37278e65f59060a1f708dc2d841d6aae02bc5440a3c99dc5fcfbebc98b68fea928b4df52ca59679d03af1dca06c553a2fe68a884b056571

Signatures

  • Process spawned unexpected child process

    Description

    This typically indicates the parent process was compromised via an exploit or macro.

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
        Execution
          Exfiltration
            Impact
              Initial Access
                Lateral Movement
                  Persistence
                    Privilege Escalation
                      Tasks

                      static1

                      8/10

                      behavioral1

                      10/10

                      behavioral2

                      10/10