General

  • Target

    Cancellation-1376764675-03112021.xls

  • Size

    277KB

  • Sample

    210311-y72nw4nfen

  • MD5

    40a5aaddd126b30b64265ac529798bd0

  • SHA1

    ca0f058f2aa9cc2038cf62efd14d5eb82feaaebd

  • SHA256

    53762e0edac9d950447b9c55d53b1aa224e8903f69a6f6fa1fe6eb76c3171365

  • SHA512

    fa6ef43ce56147e7f5a64dd0b612884dabc19ecb4c5cca40219e3d80db6da2990f39d778b442b3f55e20ba0d0109eebfbdf439a4826b90e424cfbf376d4a53b4

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://195.123.220.67/44266.6916006944.dat

xlm40.dropper

http://45.150.67.127/44266.6916006944.dat

xlm40.dropper

http://181.215.47.82/44266.6916006944.dat

xlm40.dropper

http://reynare.com/sbazaa/44266.6916006944.dat

xlm40.dropper

http://hosting152231.a2e16.netcup.net/zhrzoxxo/44266.6916006944.dat

Targets

    • Target

      Cancellation-1376764675-03112021.xls

    • Size

      277KB

    • MD5

      40a5aaddd126b30b64265ac529798bd0

    • SHA1

      ca0f058f2aa9cc2038cf62efd14d5eb82feaaebd

    • SHA256

      53762e0edac9d950447b9c55d53b1aa224e8903f69a6f6fa1fe6eb76c3171365

    • SHA512

      fa6ef43ce56147e7f5a64dd0b612884dabc19ecb4c5cca40219e3d80db6da2990f39d778b442b3f55e20ba0d0109eebfbdf439a4826b90e424cfbf376d4a53b4

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks