General

  • Target

    comun_1042.xlsb

  • Size

    77KB

  • Sample

    210315-6xa62ftf72

  • MD5

    18d76d25506af72b18ef082967d87f77

  • SHA1

    694b49a0ab22e7f06734c6a3c3898f19e84ccd68

  • SHA256

    3fa229da3e1c5ce9e890539c534d87bd94af56c1dfa50669fcf19914a8fb6b22

  • SHA512

    3355b2714f1335b4e0d4ca78e72ee7193ba8bdfd72163518b2fdba401390400d9137bbf7628a3a788179fc673196d7bb973e58bda496968663a873b1ea61630a

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://onlinestatis.bar/signup.jpg

Targets

    • Target

      comun_1042.xlsb

    • Size

      77KB

    • MD5

      18d76d25506af72b18ef082967d87f77

    • SHA1

      694b49a0ab22e7f06734c6a3c3898f19e84ccd68

    • SHA256

      3fa229da3e1c5ce9e890539c534d87bd94af56c1dfa50669fcf19914a8fb6b22

    • SHA512

      3355b2714f1335b4e0d4ca78e72ee7193ba8bdfd72163518b2fdba401390400d9137bbf7628a3a788179fc673196d7bb973e58bda496968663a873b1ea61630a

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks