General

  • Target

    Debt-Details-1318148499-03052021.xls

  • Size

    78KB

  • Sample

    210305-4wv9q9m7sx

  • MD5

    e71d78a14a5f0a046e12ab09ff674533

  • SHA1

    e59eef89178ff2824777b7f5ca44e50950fff88e

  • SHA256

    903d82f687b952277d18912b1492339944d8632c139329ba5a32c4b6b47362bf

  • SHA512

    2b66cfad8c841373868ca9274c1ce8ed1f9a9666aacc8ae37256a628c9851e4b1a02579716b81f3408b8c5dfbf2e6d82ba4e7e219896dca41d5cfb1a39a969d5

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://kosherbansko.com/vozrhzftc/44260.7283011574.dat

xlm40.dropper

http://beautyhair.by/rkqhopvrb/44260.7283011574.dat

xlm40.dropper

http://trysaileggplants.com/xbbomazcknz/44260.7283011574.dat

xlm40.dropper

http://giftcard16.com/pghxph/44260.7283011574.dat

xlm40.dropper

http://www.ausfencing.org/jqikucbefrth/44260.7283011574.dat

Targets

    • Target

      Debt-Details-1318148499-03052021.xls

    • Size

      78KB

    • MD5

      e71d78a14a5f0a046e12ab09ff674533

    • SHA1

      e59eef89178ff2824777b7f5ca44e50950fff88e

    • SHA256

      903d82f687b952277d18912b1492339944d8632c139329ba5a32c4b6b47362bf

    • SHA512

      2b66cfad8c841373868ca9274c1ce8ed1f9a9666aacc8ae37256a628c9851e4b1a02579716b81f3408b8c5dfbf2e6d82ba4e7e219896dca41d5cfb1a39a969d5

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks