General

  • Target

    Complaint-Letter-1121854452-03102021.lls.xls

  • Size

    276KB

  • Sample

    210311-xybxfnzs5j

  • MD5

    abc17c7ad001bb1d738fe6c574538b84

  • SHA1

    676f164fdce391f39f77d8f570441f1917843bfc

  • SHA256

    8cc2010fc8b821fc0a63dc91a58d3ccc2c513844659b837221d8e3877b6eb996

  • SHA512

    90821948f2bdaeb292fe74df97a8d526943c4ead49d31e864bf75e620a62107b827f7f7942b8cce2e144bb2f8874cbe5bf315a246a685d0f2a767bfa302e68f5

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://vasprogramer.com/xcuaqrfwpaf/44266.6085646991.dat

xlm40.dropper

http://mboard.baydevelopments.com/tkihlgt/44266.6085646991.dat

xlm40.dropper

http://porcarabanchel.es/kgbpstokjetx/44266.6085646991.dat

xlm40.dropper

http://klickprints.com/jcqywmbz/44266.6085646991.dat

xlm40.dropper

http://werkplaats1.okker.nl/jiejgtgde/44266.6085646991.dat

Targets

    • Target

      Complaint-Letter-1121854452-03102021.lls.xls

    • Size

      276KB

    • MD5

      abc17c7ad001bb1d738fe6c574538b84

    • SHA1

      676f164fdce391f39f77d8f570441f1917843bfc

    • SHA256

      8cc2010fc8b821fc0a63dc91a58d3ccc2c513844659b837221d8e3877b6eb996

    • SHA512

      90821948f2bdaeb292fe74df97a8d526943c4ead49d31e864bf75e620a62107b827f7f7942b8cce2e144bb2f8874cbe5bf315a246a685d0f2a767bfa302e68f5

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks