General

  • Target

    SpaceX Starbase Invite.xlsm

  • Size

    240KB

  • Sample

    210309-eqqcmrl2rs

  • MD5

    c203a4725a47fe34b5811a122d45733e

  • SHA1

    6c39c1922d4f2c5b50d8431ec1b61e73b7d2731f

  • SHA256

    99bd5914039d840274690ce7223d6504d72724a3eb55dd4dfce6de855b989174

  • SHA512

    28b619c7ff7fd25f01a5231930c9913498c9e47056683cf98464fd48b938782c48e64f26f35401573031319da3d9f20543a61774c86710a5e3449b88063175f3

Score
10/10

Malware Config

Targets

    • Target

      SpaceX Starbase Invite.xlsm

    • Size

      240KB

    • MD5

      c203a4725a47fe34b5811a122d45733e

    • SHA1

      6c39c1922d4f2c5b50d8431ec1b61e73b7d2731f

    • SHA256

      99bd5914039d840274690ce7223d6504d72724a3eb55dd4dfce6de855b989174

    • SHA512

      28b619c7ff7fd25f01a5231930c9913498c9e47056683cf98464fd48b938782c48e64f26f35401573031319da3d9f20543a61774c86710a5e3449b88063175f3

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks