General

  • Target

    attached (83).zip

  • Size

    33KB

  • Sample

    210312-az5159klke

  • MD5

    18856bb2d1feecb5bbd952b2a9dcafe2

  • SHA1

    9bc5475e0ca281b051270d6896d118cd5d40ab75

  • SHA256

    02c595803dc392dc235f662d7124b5e7814d2fa3e271b0ef7db3eefbbae03be3

  • SHA512

    126f30b43a5ff91bd3764ac3d1bb47cc4353b02cb440495210fadf3c6f2d1e6f91a3db0dd8a8cfdeeb8fa2de230d9160dd2b1eafb8a42e4a394b9ad0492adf02

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://bqx12lnjk03rrdio.xyz/i.gif

Targets

    • Target

      document-175074882.xls

    • Size

      138KB

    • MD5

      025d30c1239a11145861d23830ab7371

    • SHA1

      cb4bd95fed11cd01217b724afb805ce3bd1fbd22

    • SHA256

      13c940fd10db22f5270f1a5b20272f9ca3653f7e7d77a1265759b8c9994ef016

    • SHA512

      1e3ace43d88beb9fc66064489c328b23f9285d7366ffb50763e2b02507afb1eaed38da486ed37687885262bd9edd2e78d78e8152a6ea4e7643755cdb904e62d2

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks