General

  • Target

    Documents_635358571.xls

  • Size

    273KB

  • Sample

    210312-z8771h325e

  • MD5

    93dfa9ea842aa55647c9aacfa43e45c3

  • SHA1

    2b6e02a58673871f6b4c0f227c1756f030b58dd1

  • SHA256

    1cd45cb289571c6dd78d5cacba444eb4b870ba105f22db28270c98cb8e521709

  • SHA512

    25fdc515615e35a712dbe6fe49fd27b822682d546f7f8cceb6f9125a1ca8dfec37682fcc9735ef30efa8e87ea677d8b82e2eed11464c78737c0b6e6a71fb0b98

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://sssolutionsllc.org/k.php

Targets

    • Target

      Documents_635358571.xls

    • Size

      273KB

    • MD5

      93dfa9ea842aa55647c9aacfa43e45c3

    • SHA1

      2b6e02a58673871f6b4c0f227c1756f030b58dd1

    • SHA256

      1cd45cb289571c6dd78d5cacba444eb4b870ba105f22db28270c98cb8e521709

    • SHA512

      25fdc515615e35a712dbe6fe49fd27b822682d546f7f8cceb6f9125a1ca8dfec37682fcc9735ef30efa8e87ea677d8b82e2eed11464c78737c0b6e6a71fb0b98

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks