General

  • Target

    0945i.xlsm

  • Size

    22KB

  • Sample

    210315-6kn2t93qna

  • MD5

    75e2fb7a0084266a55e72d8af0633279

  • SHA1

    4976ff16a0fb4125ab43aad63143eedafd6e2389

  • SHA256

    d69610795caf1eb05d32091168242c48339ae5f2548c3e96127d9767d0a5132e

  • SHA512

    7d5ae6bef8cfb8865b11562b5d9dcd63e1376304cde05b027a548cf27aae15227f829397eadfdd01c9eb1bd54f77645dbb8f50b2890cc0003db9ed95a68d4cd8

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://login2.co.in/server.php

xlm40.dropper

https://app.advbabu.com/server.php

Targets

    • Target

      0945i.xlsm

    • Size

      22KB

    • MD5

      75e2fb7a0084266a55e72d8af0633279

    • SHA1

      4976ff16a0fb4125ab43aad63143eedafd6e2389

    • SHA256

      d69610795caf1eb05d32091168242c48339ae5f2548c3e96127d9767d0a5132e

    • SHA512

      7d5ae6bef8cfb8865b11562b5d9dcd63e1376304cde05b027a548cf27aae15227f829397eadfdd01c9eb1bd54f77645dbb8f50b2890cc0003db9ed95a68d4cd8

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Deletes itself

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks