General

  • Target

    SpaceX Starbase Invite.xlsm

  • Size

    242KB

  • Sample

    210308-ptf4qkbb5j

  • MD5

    b46aa5f81d293bc7791a720b6447d01f

  • SHA1

    a8ab19110c407b6e04e460fa8bc33685868a026d

  • SHA256

    2355f05bca712ce31b1fef911395862eb34e73db7a3ca0a6bee2664024e47518

  • SHA512

    8c3b80ff99948aa1f67ed9b6a9c5b2b1225b9246b71b7a8f97661bd054339f67e82aa7f118fed8462ce20ff1a58d9f07cb07c91f1220ac48d8fd1502f1be1e93

Score
10/10

Malware Config

Targets

    • Target

      SpaceX Starbase Invite.xlsm

    • Size

      242KB

    • MD5

      b46aa5f81d293bc7791a720b6447d01f

    • SHA1

      a8ab19110c407b6e04e460fa8bc33685868a026d

    • SHA256

      2355f05bca712ce31b1fef911395862eb34e73db7a3ca0a6bee2664024e47518

    • SHA512

      8c3b80ff99948aa1f67ed9b6a9c5b2b1225b9246b71b7a8f97661bd054339f67e82aa7f118fed8462ce20ff1a58d9f07cb07c91f1220ac48d8fd1502f1be1e93

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks