General

  • Target

    _attached_file (65).zip

  • Size

    33KB

  • Sample

    210312-n9e7k46fa6

  • MD5

    f508dbc09d4051917a8525ca71ea0af5

  • SHA1

    2524ffc0ca40054869776f0cbea6de7088d66531

  • SHA256

    075e9941b491dc384744873446eee63d2ee56afa33a9d125f5ab67d88281bf3f

  • SHA512

    24e1dc0a42ea6e854ba8f02d2f1a4f95ecbd2231dbe68b876fdaeaadaf43a3d6b9a2220bb8060ddf8a734d74defe2e69ba6a0aaf22fceab18a5f4f4730b6b104

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://gcfxb12aefoyn03epdoji.xyz/i.gif

Targets

    • Target

      document-246961895.xls

    • Size

      138KB

    • MD5

      daf8e8e76614a4d0d15d8cbd57adefd2

    • SHA1

      12213007f05143448971f1e306eb0724b60bbb9b

    • SHA256

      d8e3f79d4c4e19a8562abfb10a88303b97d5bfaca4d1b7d152881923f813cac8

    • SHA512

      d16387f4ae9c736fe835674ca776dbfd287b1433ac992ae60d4cd2c6f066f8adb7969063854b38cd7d92a50a89f407c81f95fe01b16c244fc39fc1b48a07b234

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks