General

  • Target

    doc-13.zip

  • Size

    14KB

  • Sample

    210303-majx77y8jx

  • MD5

    7fad66cddd751f0d6e71a0ab67540302

  • SHA1

    56c13e7f33316c77fcb4b114a0ba4b9f89a73653

  • SHA256

    5816b4bbe8effbcc1782adb02e45b93cddb1644abb568ccbd02c1041368d67c1

  • SHA512

    e2475d1a6f4a361a6e5629e8256e3528617b9fe117fc7d22c9c79cba0aab0fc7bbef924ad58d6d3a8e0736a38acf35b39dde536dddcdf9736613db4d67a2371d

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://cidn02mjco03pobx.com/index.xls

Targets

    • Target

      document-460240546.xls

    • Size

      86KB

    • MD5

      bf0044be9b86f3c9291bae14dd1d5987

    • SHA1

      a3bfbdfa6b051b88e2d1d9fa2c96df3a4c44e274

    • SHA256

      2b40abce4310f86fff1d92065787e2ac0c18d05dfd5ce8defabb60a04afa659d

    • SHA512

      a93af649c42f3ef4bdd51df1c4e598eb78f9a9b688b6b6011b82216d1eb35ab66fa700d6cd8920d39c34a2887418ff4849eb9cdc20ca8e5c9277d46e85bdc266

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks