General

  • Target

    this_issue (72).zip

  • Size

    42KB

  • Sample

    210315-47cef4z2yx

  • MD5

    9bec294c1292e421bd636077ab67ce7c

  • SHA1

    d6cc34658f7b7e83ba6d688470a59f59a4a79416

  • SHA256

    24bdc455f832ebe94c81c38493191bf3415e91377f2c336f88d634b77a0d55ed

  • SHA512

    43f79abd0b040f71e9a1a592d72b8571d5dc644d8ab23ca0722f3e903ba69e0c3934e63032dfb0f5d787311458f7c539cfe6f45c7bf09ddd3a65b67f24b64bef

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://sal03gicu03qcwtif.com/index.gif

Targets

    • Target

      Documents492.xlsm

    • Size

      57KB

    • MD5

      4168738fae0705c01339de24d3f94b42

    • SHA1

      57f932261157a009d070dd0e1475474ca8f7948c

    • SHA256

      9bbc391b874c7a1365df81fd20d85cfdc5ec42efab14cbdd00125ec869837043

    • SHA512

      3d1ac743d81e629d621f3acbf5848f525f5df7397632553b4576ff162fd1c5fa59285cb4c931329e4739c1cdf17ce1fe72071652de348cf612ffebaa05ef68df

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks