General

  • Target

    Complaint-Copy-1282712231-03092021.xls

  • Size

    82KB

  • Sample

    210309-zanwqfdn7x

  • MD5

    0ea37fca5f366b0fb584cf66e7d64e19

  • SHA1

    40fae8524d74a5eae16ece4adb80c8eb09a9cc8e

  • SHA256

    b6749817ce9452e12bd664d7165b1986875359cb96b2579380e3e83cc441e148

  • SHA512

    48e3aa0b4fa951bc6a91e3cc59cea0b67b0a67f072af789bb19a2547e481eef3b8dcb70711e374a24dc0d70dbb33137a4e4678ad35ab52268e9db5d485d38896

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://ca.jimitrangras.com/sjntt/44264.7754471065.dat

xlm40.dropper

http://pokojewewladyslawowie.pl/orlpzhiy/44264.7754471065.dat

xlm40.dropper

http://naidunews.com/ohcagctzl/44264.7754471065.dat

xlm40.dropper

http://buscocasascr.com/xqqikyc/44264.7754471065.dat

xlm40.dropper

http://follow-trader.com/haxzmg/44264.7754471065.dat

Targets

    • Target

      Complaint-Copy-1282712231-03092021.xls

    • Size

      82KB

    • MD5

      0ea37fca5f366b0fb584cf66e7d64e19

    • SHA1

      40fae8524d74a5eae16ece4adb80c8eb09a9cc8e

    • SHA256

      b6749817ce9452e12bd664d7165b1986875359cb96b2579380e3e83cc441e148

    • SHA512

      48e3aa0b4fa951bc6a91e3cc59cea0b67b0a67f072af789bb19a2547e481eef3b8dcb70711e374a24dc0d70dbb33137a4e4678ad35ab52268e9db5d485d38896

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks