General

  • Target

    _attached_file (44).zip

  • Size

    14KB

  • Sample

    210304-hrr34kfw2x

  • MD5

    c0cb3459cf77ac913bb1b53a083361fe

  • SHA1

    d680cc10b0c6c5c8af5249da64dadd600e920aea

  • SHA256

    5d437a101ba7e322abc080edb59e08d4443a6dd361e6bdf98679e1525d6cb0f6

  • SHA512

    028916cec14ae0e1d21513936a469b8dd900085c10e16480cc999b9f14309752207486da3bec62dd9bcae9e294cbc0347aeca712b91d1e615a958652d380d50b

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://cidn02mjco03pobx.com/index.xls

Targets

    • Target

      document-262955163.xls

    • Size

      86KB

    • MD5

      7cd074b62efb063ad06456a4a1a723e4

    • SHA1

      8cddc76d8d626150aa6f68ac881aae5a6a588712

    • SHA256

      df35764a56ec24aad11d15fbf6afb18189f6ac0e42d9362358d42f1730c0c14b

    • SHA512

      20b2fc3b2f9d6624f7284117b04df4aa5c3eb76e21641f17baf1c10dc4cac80261d8fc4848811448842439b1e6beba1af5e64e6c85133b77b765e680563a82ce

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks