General

  • Target

    Cancellation-1331722858-03112021.xls

  • Size

    277KB

  • Sample

    210311-8zgf52hs1n

  • MD5

    f75980b86bd6ec72bec67a45a9e424bd

  • SHA1

    59cb624ef59997a09c76f5e76f666835ce93536b

  • SHA256

    37541b5a97a391ff41221a8486d206db6263686950825780eaec989113bddff7

  • SHA512

    3372aee962e66443c7fe175fc397bd9bdd1a43ee55a979720a4872cf183b8caf35a87a75530eaa7bde100c6dcdabcec5f8bcdaff9e0328ebffce05663fe6b8a8

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://195.123.220.67/44266.8317842593.dat

xlm40.dropper

http://45.150.67.127/44266.8317842593.dat

xlm40.dropper

http://181.215.47.82/44266.8317842593.dat

xlm40.dropper

http://reynare.com/sbazaa/44266.8317842593.dat

xlm40.dropper

http://hosting152231.a2e16.netcup.net/zhrzoxxo/44266.8317842593.dat

Targets

    • Target

      Cancellation-1331722858-03112021.xls

    • Size

      277KB

    • MD5

      f75980b86bd6ec72bec67a45a9e424bd

    • SHA1

      59cb624ef59997a09c76f5e76f666835ce93536b

    • SHA256

      37541b5a97a391ff41221a8486d206db6263686950825780eaec989113bddff7

    • SHA512

      3372aee962e66443c7fe175fc397bd9bdd1a43ee55a979720a4872cf183b8caf35a87a75530eaa7bde100c6dcdabcec5f8bcdaff9e0328ebffce05663fe6b8a8

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks