General

  • Target

    SpaceX Starbase Invite.xlsm

  • Size

    256KB

  • Sample

    210308-l6hyjzzkj6

  • MD5

    b655d87f41a5229d11f05b02c5d67dad

  • SHA1

    eacd27a128dbf1fde6374ad18026461bc12c607a

  • SHA256

    64d0c3abb69565bb7a9cced68e5034cb6366eb77809eba347aece577a0a9e4f7

  • SHA512

    250ce37857b9a4459e1987dc4cef1f0fbd7dce906b95b5ff05d7811c3860d638e00244f5534e6ace6f22f8095354193d277b72678e987dc90bc04715231ed8a2

Score
10/10

Malware Config

Targets

    • Target

      SpaceX Starbase Invite.xlsm

    • Size

      256KB

    • MD5

      b655d87f41a5229d11f05b02c5d67dad

    • SHA1

      eacd27a128dbf1fde6374ad18026461bc12c607a

    • SHA256

      64d0c3abb69565bb7a9cced68e5034cb6366eb77809eba347aece577a0a9e4f7

    • SHA512

      250ce37857b9a4459e1987dc4cef1f0fbd7dce906b95b5ff05d7811c3860d638e00244f5534e6ace6f22f8095354193d277b72678e987dc90bc04715231ed8a2

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Tasks