General

  • Target

    Debt-Details-854237329-03052021.xls

  • Size

    78KB

  • Sample

    210305-v58rnhs6sn

  • MD5

    f0e172b4b6c31813387f584f95da632a

  • SHA1

    38291885db835e98c518f4a4c86819f0e16a8808

  • SHA256

    f72f56e3b37660a45354150c63713dabc406ba057098c733fae08aaf1c4e9695

  • SHA512

    c475b4e057673a77f8b167213a8f44e3352e70dc89838ff47b65faff73b45863e5165322e37520e4aaf45e19912525408f2f1cce89d8d8f475d63e61a79b9f2d

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://warbeckcreative.net/jrsmbgsszm/44260.6942425926.dat

xlm40.dropper

http://gravestake.com/xaxyemzhgx/44260.6942425926.dat

xlm40.dropper

http://curvewilderness.com/fwsyrt/44260.6942425926.dat

xlm40.dropper

http://potnaalgrowesr.com/wlzcxyri/44260.6942425926.dat

xlm40.dropper

http://limitedcrystal.com/kfnxzrydpstx/44260.6942425926.dat

Targets

    • Target

      Debt-Details-854237329-03052021.xls

    • Size

      78KB

    • MD5

      f0e172b4b6c31813387f584f95da632a

    • SHA1

      38291885db835e98c518f4a4c86819f0e16a8808

    • SHA256

      f72f56e3b37660a45354150c63713dabc406ba057098c733fae08aaf1c4e9695

    • SHA512

      c475b4e057673a77f8b167213a8f44e3352e70dc89838ff47b65faff73b45863e5165322e37520e4aaf45e19912525408f2f1cce89d8d8f475d63e61a79b9f2d

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks