General

  • Target

    CompensationClaim_916887251_03122021.xls

  • Size

    280KB

  • Sample

    210312-7x3mnh8bda

  • MD5

    00b3e93aa50b54e4370685eac11359e0

  • SHA1

    979caebf13a6a7bb3ce36ca4d63596bf98fe75d3

  • SHA256

    1a5b07ad875ff013b0a98cab20382645f0465201b6b29a83b99b671a5240a40d

  • SHA512

    0caa35aea822cf77c397abadebfbd8deecf2b8ad41497cbc9270e1c83e9a3122112307d3dcb810488f4843b072fc32677d84a1f55be23bbf2526a0638de385bd

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://185.82.219.161/44267.7524708333.dat

xlm40.dropper

http://45.140.146.26/44267.7524708333.dat

xlm40.dropper

http://188.127.227.167/44267.7524708333.dat

xlm40.dropper

http://44267.7524708333.dat

Targets

    • Target

      CompensationClaim_916887251_03122021.xls

    • Size

      280KB

    • MD5

      00b3e93aa50b54e4370685eac11359e0

    • SHA1

      979caebf13a6a7bb3ce36ca4d63596bf98fe75d3

    • SHA256

      1a5b07ad875ff013b0a98cab20382645f0465201b6b29a83b99b671a5240a40d

    • SHA512

      0caa35aea822cf77c397abadebfbd8deecf2b8ad41497cbc9270e1c83e9a3122112307d3dcb810488f4843b072fc32677d84a1f55be23bbf2526a0638de385bd

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks