General

  • Target

    document (81).zip

  • Size

    33KB

  • Sample

    210312-39hx23b4he

  • MD5

    59bed36734496d7bdb8e91cd1b57ab56

  • SHA1

    6cc903fee61ec2885a07351233ab01592955c6d5

  • SHA256

    f5da6b17283e44fd29b292237e49c73fd4fadca5f8c288f1fb5aef3f98a36062

  • SHA512

    a6a0ec918c756586b8746e89d4ab27b14f71943263dad36ae561ca048665e6f63e4b72930dbf0b86b9ac94fc7e04f91d0cbe3358517083a57322e5a02d5f0b34

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://nvelj12qyyfi03kqxy.xyz/i.gif

Targets

    • Target

      document-1774673587.xls

    • Size

      138KB

    • MD5

      2268b0c2b9633c9ae70f7590099e27bf

    • SHA1

      3e0d2c030e7a03427e4022188ffa6054ab614708

    • SHA256

      de4971226059d4bae8c08ba14a5217e1da05a4bdd17d2e7c76f54755d9f8f428

    • SHA512

      d0a3aeb0319c8182979e05803dab4607ff02d73d62f74d1f885630142a3b9f30af9e0ef7a3d594d3d0d1555fd88b05574c09a1fa100ca780cad9f4de890f969f

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks