General

  • Target

    Complaint-Letter-1395728961-03102021.zip

  • Size

    49KB

  • Sample

    210311-clkjzqxzps

  • MD5

    8f153e5f16a667846d43f4c0db3ae69d

  • SHA1

    5df7faed459e97adb422209389f78bce09b00d37

  • SHA256

    3cf601796519e4da293f209c8e9cf32c206b551ca74cc6e612ecbd0a485d36f1

  • SHA512

    996f7dd28a9cdbe95d44708d3422928e8968bf8f2b8f58a46bf19ffc6191739d659ead15b706a52580ee731e77b4d2cb8785549ad3eb1c15fa9654fff9cae90c

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://lackenbauer.ru/bd/hhvqjrec/44266.6243143519.dat

xlm40.dropper

http://www.peacezoneacademy.com/dxsbonlv/44266.6243143519.dat

xlm40.dropper

http://jopo.com/gmaaxbro/44266.6243143519.dat

xlm40.dropper

http://www.thegivingwall.co.uk/jfgolx/44266.6243143519.dat

xlm40.dropper

http://baxtercode.com/qkhpnucmzts/44266.6243143519.dat

Targets

    • Target

      Complaint-Letter-1395728961-03102021.xls

    • Size

      276KB

    • MD5

      3ed5528ee05c783b23ac82560ffeff64

    • SHA1

      9433fd1f21b192721e45ecd423b8b9ddc7e82a7b

    • SHA256

      cef5d481de4228ffd8ac4483449c58babd5e389371852faa68ac83748624be36

    • SHA512

      86223d5a921ee5447d12e97dfe984561712177450c4f8ebf711c957ca0d8850afb4ac0ed75bf2c15609a5a54f39c3436395faa92401b393f7e85ef80f9270d87

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks