General

  • Target

    Documents56.xlsm

  • Size

    57KB

  • Sample

    210315-6dy7xe3gj2

  • MD5

    4168738fae0705c01339de24d3f94b42

  • SHA1

    57f932261157a009d070dd0e1475474ca8f7948c

  • SHA256

    9bbc391b874c7a1365df81fd20d85cfdc5ec42efab14cbdd00125ec869837043

  • SHA512

    3d1ac743d81e629d621f3acbf5848f525f5df7397632553b4576ff162fd1c5fa59285cb4c931329e4739c1cdf17ce1fe72071652de348cf612ffebaa05ef68df

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://sal03gicu03qcwtif.com/index.gif

Targets

    • Target

      Documents56.xlsm

    • Size

      57KB

    • MD5

      4168738fae0705c01339de24d3f94b42

    • SHA1

      57f932261157a009d070dd0e1475474ca8f7948c

    • SHA256

      9bbc391b874c7a1365df81fd20d85cfdc5ec42efab14cbdd00125ec869837043

    • SHA512

      3d1ac743d81e629d621f3acbf5848f525f5df7397632553b4576ff162fd1c5fa59285cb4c931329e4739c1cdf17ce1fe72071652de348cf612ffebaa05ef68df

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks