General

  • Target

    Debt-Details-1857159816-03052021.xls

  • Size

    78KB

  • Sample

    210305-rb9z8thhae

  • MD5

    940707d8ae9ac2e601aecf16961f656f

  • SHA1

    b3dd489a819db2f626cde1602f12d898093965a9

  • SHA256

    2bb72fab9786239824a6055da9b0b84819621dff0dd94da340a0017a852618de

  • SHA512

    d422774195b7392c9428094c365f870f1bc767cbc6e92c8b3e963a1004bb5f25f6c4d1a0334106685a644a3c8cae2e568bd988d5391dc6aa71622ac4ec0d5156

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://kosherbansko.com/vozrhzftc/44260.6880814815.dat

xlm40.dropper

http://beautyhair.by/rkqhopvrb/44260.6880814815.dat

xlm40.dropper

http://trysaileggplants.com/xbbomazcknz/44260.6880814815.dat

xlm40.dropper

http://giftcard16.com/pghxph/44260.6880814815.dat

xlm40.dropper

http://www.ausfencing.org/jqikucbefrth/44260.6880814815.dat

Targets

    • Target

      Debt-Details-1857159816-03052021.xls

    • Size

      78KB

    • MD5

      940707d8ae9ac2e601aecf16961f656f

    • SHA1

      b3dd489a819db2f626cde1602f12d898093965a9

    • SHA256

      2bb72fab9786239824a6055da9b0b84819621dff0dd94da340a0017a852618de

    • SHA512

      d422774195b7392c9428094c365f870f1bc767cbc6e92c8b3e963a1004bb5f25f6c4d1a0334106685a644a3c8cae2e568bd988d5391dc6aa71622ac4ec0d5156

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks