General

  • Target

    CompensationClaim_1132717900_03152021.xls_841C71FFA67996D4499BA392DAC351FA.zip

  • Size

    153KB

  • Sample

    210315-4fwpj7v2f2

  • MD5

    86f5e5be0257ed8601bef5cef7dbac0c

  • SHA1

    670cd81e0b6cdb3968b75d34eec5c5f9f5c7d873

  • SHA256

    112b835045850e5a2e07cb958e557e31fedbd2d9b6beb295e0dc0a1122b659d7

  • SHA512

    47eb2065a275b78a53b1a46fed00af7ee18355aa1ddfd444dc56d25186aceb155b2daa247b739932093abedc5a9bd98e8c401db2548ffeb21546b37abead01f9

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://188.127.254.114/44270.7733881944.dat

xlm40.dropper

http://185.82.219.160/44270.7733881944.dat

xlm40.dropper

http://45.140.146.34/44270.7733881944.dat

Targets

    • Target

      CompensationClaim_1132717900_03152021.xls

    • Size

      233KB

    • MD5

      841c71ffa67996d4499ba392dac351fa

    • SHA1

      0f05f4eda41b530edca06efa60cd182dea88f54e

    • SHA256

      4ed148904f40a652b9918ca1446af1f308287bc325a6dc363fe7693b22b3a073

    • SHA512

      cd0624a348476de14ba88081f3f9310e5f81f1b9028fc32e206e4d8496d80139a7d840f5f52981c3955cbd297ee508016383386603258e00d0a73df1b76f3f45

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks