General

  • Target

    SpaceX Starbase Invite.xlsm

  • Size

    242KB

  • Sample

    210310-lxvshhg6w6

  • MD5

    3f8ea86cf6cf87e687b31a59e087dd7f

  • SHA1

    ef9e0e5ac5ede2626db2bc9c0683200fc8a4813a

  • SHA256

    373f30874b0bf0abdd58ab6b4fe7f1001c651dd1336649dff47b0d877a4afb5e

  • SHA512

    a5b9c682fa1f8172c755a09620df394b3dbfca0e3d39eac2fd2edc08b065f7dc3405eee98c4a570301086cd1ae48586c67f6dc7603bef37d39a40dcdd4f82451

Score
10/10

Malware Config

Targets

    • Target

      SpaceX Starbase Invite.xlsm

    • Size

      242KB

    • MD5

      3f8ea86cf6cf87e687b31a59e087dd7f

    • SHA1

      ef9e0e5ac5ede2626db2bc9c0683200fc8a4813a

    • SHA256

      373f30874b0bf0abdd58ab6b4fe7f1001c651dd1336649dff47b0d877a4afb5e

    • SHA512

      a5b9c682fa1f8172c755a09620df394b3dbfca0e3d39eac2fd2edc08b065f7dc3405eee98c4a570301086cd1ae48586c67f6dc7603bef37d39a40dcdd4f82451

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks