General

  • Target

    SpaceX Starbase Invite.xlsm

  • Size

    253KB

  • Sample

    210308-q97m1efah6

  • MD5

    5fd44b5a1abea3f880bfa3e32b0dda43

  • SHA1

    835621322f1ee6cb637c94d50efa7f704bd4b650

  • SHA256

    cf143b7f45179622dce93a753765349436506ac2b035c007b1699ba1490a31c9

  • SHA512

    b04e88dbde0aa441bd0d17871cd9c85e22b934bbefcb69a52d6016274d2fecfb69553b2c41610bdd470d91d0c8167c59d562814a398d1948056d4897a9cdcd08

Score
10/10

Malware Config

Targets

    • Target

      SpaceX Starbase Invite.xlsm

    • Size

      253KB

    • MD5

      5fd44b5a1abea3f880bfa3e32b0dda43

    • SHA1

      835621322f1ee6cb637c94d50efa7f704bd4b650

    • SHA256

      cf143b7f45179622dce93a753765349436506ac2b035c007b1699ba1490a31c9

    • SHA512

      b04e88dbde0aa441bd0d17871cd9c85e22b934bbefcb69a52d6016274d2fecfb69553b2c41610bdd470d91d0c8167c59d562814a398d1948056d4897a9cdcd08

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks