General

  • Target

    652.xlsm

  • Size

    25KB

  • Sample

    210311-absp6prp36

  • MD5

    4c9fd77bd706ce1575c060b7eaae1b6d

  • SHA1

    793ebfe97b17c063555155c04a953ee90e1535cd

  • SHA256

    df5ee36ad0c3ddabffd52a8334e37d8c10f7ab9162a492e9fc058a91769a2f65

  • SHA512

    51f1e39437d4b7ab556a5888f68e8675a92a3bcd2b0d0813de581bc74e38d3d6ee40051452c64fe721160ed5f3e606f364e585586899198420205ea97c546ea8

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://fernandogaleano.com/server.php

xlm40.dropper

https://tcommerceshop.com/server.php

Targets

    • Target

      652.xlsm

    • Size

      25KB

    • MD5

      4c9fd77bd706ce1575c060b7eaae1b6d

    • SHA1

      793ebfe97b17c063555155c04a953ee90e1535cd

    • SHA256

      df5ee36ad0c3ddabffd52a8334e37d8c10f7ab9162a492e9fc058a91769a2f65

    • SHA512

      51f1e39437d4b7ab556a5888f68e8675a92a3bcd2b0d0813de581bc74e38d3d6ee40051452c64fe721160ed5f3e606f364e585586899198420205ea97c546ea8

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Deletes itself

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks