General

  • Target

    prepared (57).zip

  • Size

    33KB

  • Sample

    210312-v8z3f3pg12

  • MD5

    f8217d8d99da3245d5dead80754d1f94

  • SHA1

    b8ef6c8f397d053314e8bcc15b81297dd8959960

  • SHA256

    a94a75d6af90e518d1177cb396a33af5bfe645c751039f3536483b208d8b0c42

  • SHA512

    6d22932d46a73b8a6f222e5edb8f6e3f304418b9883a5aafad82ed2b69b48925393d3c72eb8f053142068ebf5225d2b7a5ae52d26aa5ad317610333aed41b609

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://bqx12lnjk03rrdio.xyz/i.gif

Targets

    • Target

      document-837259296.xls

    • Size

      138KB

    • MD5

      c841274d86403d03362a8be942207ac2

    • SHA1

      b3b72c38ce9c15bde808ede5887429168143802c

    • SHA256

      aabd8e37baec4efceb3d5d7f6d307ad3d64c47d93602c967ca3e559208e7015f

    • SHA512

      3862fc3dcc13891c4948e5cd4e9ade7885b8b2227a360f5ad1703687d87cd8e72f9914c58dbd1a6badb8763b5860b5e4f71f975bd001885d0dc30948558b4330

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks