General

  • Target

    document-1812162758.xls

  • Size

    138KB

  • Sample

    210312-jvkcf9g76a

  • MD5

    f5ee428d9e8a0775a2589b5d9e8bbd76

  • SHA1

    7f19c82ca70376110ae74dcd3c65f1ce204b6a6f

  • SHA256

    ef760ceabfd9410e28de9ca1c038f95907407d15fe401f032875c621e715b9a4

  • SHA512

    620cec5f752b190a48e3f90869aab844c9e514c9f1004fb613500320a7917eb711e7a13c1fe89e7268cd83be4628b03d8e5c3746093d903acae36abbb32272d6

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://ipok12bcame03shzpiq.xyz/i.gif

Targets

    • Target

      document-1812162758.xls

    • Size

      138KB

    • MD5

      f5ee428d9e8a0775a2589b5d9e8bbd76

    • SHA1

      7f19c82ca70376110ae74dcd3c65f1ce204b6a6f

    • SHA256

      ef760ceabfd9410e28de9ca1c038f95907407d15fe401f032875c621e715b9a4

    • SHA512

      620cec5f752b190a48e3f90869aab844c9e514c9f1004fb613500320a7917eb711e7a13c1fe89e7268cd83be4628b03d8e5c3746093d903acae36abbb32272d6

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks