General

  • Target

    document-2008647060.xls

  • Size

    138KB

  • Sample

    210312-b4lvnt992j

  • MD5

    98524b1d42bf8200f9f4be955932e129

  • SHA1

    5b19e2410587494e485add776c63e67c9392fd4a

  • SHA256

    e0bb1e54a2782e1d8f1f28235b77db0142b02c598bff425ed10a01cc1bf7fd79

  • SHA512

    2ff8ff0d6dae0b2dccf9cc26f1a89fdb6669f49e0c1038e939cba8eea54ce187d142587718d2d3943cd5da7a3538682bf1526cf3f3487dd303a26f6ef111463f

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://gcfxb12aefoyn03epdoji.xyz/i.gif

Targets

    • Target

      document-2008647060.xls

    • Size

      138KB

    • MD5

      98524b1d42bf8200f9f4be955932e129

    • SHA1

      5b19e2410587494e485add776c63e67c9392fd4a

    • SHA256

      e0bb1e54a2782e1d8f1f28235b77db0142b02c598bff425ed10a01cc1bf7fd79

    • SHA512

      2ff8ff0d6dae0b2dccf9cc26f1a89fdb6669f49e0c1038e939cba8eea54ce187d142587718d2d3943cd5da7a3538682bf1526cf3f3487dd303a26f6ef111463f

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks