General

  • Target

    Statement_as_of 02_17_2021.xlsm

  • Size

    72KB

  • Sample

    210303-rkpbmp1kgx

  • MD5

    d22a7e87a13baeb583c870e2d40798fc

  • SHA1

    9c673526cbba244d992898e6088a6cb17c5588f7

  • SHA256

    8243d4138835db46bef1051fd0b396a110968deb97078b07fbd6ab60b6cc3bc3

  • SHA512

    bb684c323680dc70acc645b37e5e6d54f121aa9dc4d56a17aef75184951a090bb986def9a93764c4ca82017d1bb8f837eb306103f388f6b5169675879ce8b47a

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      Statement_as_of 02_17_2021.xlsm

    • Size

      72KB

    • MD5

      d22a7e87a13baeb583c870e2d40798fc

    • SHA1

      9c673526cbba244d992898e6088a6cb17c5588f7

    • SHA256

      8243d4138835db46bef1051fd0b396a110968deb97078b07fbd6ab60b6cc3bc3

    • SHA512

      bb684c323680dc70acc645b37e5e6d54f121aa9dc4d56a17aef75184951a090bb986def9a93764c4ca82017d1bb8f837eb306103f388f6b5169675879ce8b47a

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v6

Tasks