General

  • Target

    document-1427996815.xls

  • Size

    138KB

  • Sample

    210312-nc6mf5846e

  • MD5

    1aa8b3abd339038569d7df4fd8e6dc99

  • SHA1

    7bed8cddc2d7a354618bd4839fec50047a84c9b1

  • SHA256

    09f89aadd7c1456cad78be98286b61277b3de6eecefb3169ee1953bcbcac13c2

  • SHA512

    3e65f15c53bbc1a5e487ed06e396123c79cda5e7903644d6f06d92791f44966d3601fad6e62828029ea559276d5614f5d404931b1814107cbba863c13bfdbeef

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://gcfxb12aefoyn03epdoji.xyz/i.gif

Targets

    • Target

      document-1427996815.xls

    • Size

      138KB

    • MD5

      1aa8b3abd339038569d7df4fd8e6dc99

    • SHA1

      7bed8cddc2d7a354618bd4839fec50047a84c9b1

    • SHA256

      09f89aadd7c1456cad78be98286b61277b3de6eecefb3169ee1953bcbcac13c2

    • SHA512

      3e65f15c53bbc1a5e487ed06e396123c79cda5e7903644d6f06d92791f44966d3601fad6e62828029ea559276d5614f5d404931b1814107cbba863c13bfdbeef

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks