General

  • Target

    Complaint-Letter-1973823858-03102021.xls

  • Size

    276KB

  • Sample

    210312-vtpbcctjv6

  • MD5

    8432ec3b0604d96a7ec137b80ac050a2

  • SHA1

    63dfe8269e0451a0a54d91706d85132f50188ea0

  • SHA256

    fc8bbe7b84a60771d654fb9efd2cc848e3f3ffe72ce3bb395326d9a15fbd1f59

  • SHA512

    91f744e0d9e34c0f5adfd88e405f18e180f469e6da457efaea80c841dfaf7f231886c785aa12033c014aba0b418c5fbf74929de1efed73df3a5a72ccedf640b3

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://vasprogramer.com/xcuaqrfwpaf/44267.6477175926.dat

xlm40.dropper

http://mboard.baydevelopments.com/tkihlgt/44267.6477175926.dat

xlm40.dropper

http://porcarabanchel.es/kgbpstokjetx/44267.6477175926.dat

xlm40.dropper

http://klickprints.com/jcqywmbz/44267.6477175926.dat

xlm40.dropper

http://werkplaats1.okker.nl/jiejgtgde/44267.6477175926.dat

Targets

    • Target

      Complaint-Letter-1973823858-03102021.xls

    • Size

      276KB

    • MD5

      8432ec3b0604d96a7ec137b80ac050a2

    • SHA1

      63dfe8269e0451a0a54d91706d85132f50188ea0

    • SHA256

      fc8bbe7b84a60771d654fb9efd2cc848e3f3ffe72ce3bb395326d9a15fbd1f59

    • SHA512

      91f744e0d9e34c0f5adfd88e405f18e180f469e6da457efaea80c841dfaf7f231886c785aa12033c014aba0b418c5fbf74929de1efed73df3a5a72ccedf640b3

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks