General

  • Target

    dettagli_647.xlsb

  • Size

    64KB

  • Sample

    210315-9vhk21y142

  • MD5

    307bb8ba033af4ecc5627763607084e6

  • SHA1

    b3b0124507b1fb28f03d9949c75b1fe65e1fc07a

  • SHA256

    e7ffee57698aeb8ff7211cbe321e3e5b17c20bc6549916ce651015c2bf6816c3

  • SHA512

    3c7e368b9a0940e0735066610b70abea0dbcffb6605d46bbed5ab6a8fbbdde1c88c3bce9d99fad28a3b27db8d9f7ac85a0264b78021df5b4792c2c593582e1f5

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://linestata.casa/register.jpg

Targets

    • Target

      dettagli_647.xlsb

    • Size

      64KB

    • MD5

      307bb8ba033af4ecc5627763607084e6

    • SHA1

      b3b0124507b1fb28f03d9949c75b1fe65e1fc07a

    • SHA256

      e7ffee57698aeb8ff7211cbe321e3e5b17c20bc6549916ce651015c2bf6816c3

    • SHA512

      3c7e368b9a0940e0735066610b70abea0dbcffb6605d46bbed5ab6a8fbbdde1c88c3bce9d99fad28a3b27db8d9f7ac85a0264b78021df5b4792c2c593582e1f5

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks