General

  • Target

    SpaceX Starbase Invite.xlsm

  • Size

    257KB

  • Sample

    210308-8py8ckrj96

  • MD5

    38dc747ed2bf525fead782fe6f574a00

  • SHA1

    44cceb31b278afa3140c542a68729ead631cc9b5

  • SHA256

    20b2ce41d0aaa9f142ca4e20060c91ec304f97f0579b62d906c009fc92f1af4e

  • SHA512

    c467afee33999e9d0b152dfc026c1c38d2cde3031ee62aaf64e6c6513e8ee1d8a27825435ede7788ee0678fcbfc374c3c2c59e6e8fa106fa3c8dc20e3e228194

Score
10/10

Malware Config

Targets

    • Target

      SpaceX Starbase Invite.xlsm

    • Size

      257KB

    • MD5

      38dc747ed2bf525fead782fe6f574a00

    • SHA1

      44cceb31b278afa3140c542a68729ead631cc9b5

    • SHA256

      20b2ce41d0aaa9f142ca4e20060c91ec304f97f0579b62d906c009fc92f1af4e

    • SHA512

      c467afee33999e9d0b152dfc026c1c38d2cde3031ee62aaf64e6c6513e8ee1d8a27825435ede7788ee0678fcbfc374c3c2c59e6e8fa106fa3c8dc20e3e228194

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Tasks