General

  • Target

    Debt-Details-1478647444-03052021.xls

  • Size

    78KB

  • Sample

    210305-b9ln3ge2te

  • MD5

    2340453a7bb4c9e059c58410f217345d

  • SHA1

    3ea6c5b06d2e39183e79b9677e88c715c92806ec

  • SHA256

    9726146961b930a5c74c8cf6606ba98556d1d2d810de70f413535d2120c24082

  • SHA512

    75dc14fedb956200752c940a318e5944bba6df6b4918117a72a2a0257016aeeacd9f05e74c8fa78f7849a227cedfd8c0709b81d4af6a6f22a40b25ae82900c41

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://kosherbansko.com/vozrhzftc/44260.8080024306.dat

xlm40.dropper

http://beautyhair.by/rkqhopvrb/44260.8080024306.dat

xlm40.dropper

http://trysaileggplants.com/xbbomazcknz/44260.8080024306.dat

xlm40.dropper

http://giftcard16.com/pghxph/44260.8080024306.dat

xlm40.dropper

http://www.ausfencing.org/jqikucbefrth/44260.8080024306.dat

Targets

    • Target

      Debt-Details-1478647444-03052021.xls

    • Size

      78KB

    • MD5

      2340453a7bb4c9e059c58410f217345d

    • SHA1

      3ea6c5b06d2e39183e79b9677e88c715c92806ec

    • SHA256

      9726146961b930a5c74c8cf6606ba98556d1d2d810de70f413535d2120c24082

    • SHA512

      75dc14fedb956200752c940a318e5944bba6df6b4918117a72a2a0257016aeeacd9f05e74c8fa78f7849a227cedfd8c0709b81d4af6a6f22a40b25ae82900c41

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks