General

  • Target

    dettagli_1311.xlsb

  • Size

    85KB

  • Sample

    210315-adl73jvyqa

  • MD5

    d2214a27395a09dd9e994c5dd70b3dfa

  • SHA1

    91619e0072244de266e3b827f8a097d869e1e3db

  • SHA256

    e63ec3f8bf393da29d5225bb6f1f47b7786839784fa2ee5f867f64f8af8462e3

  • SHA512

    28b00d0cb518a3e775a770f1789e83ee37b110a3d34d29cc1439c5d5b9b23e750c91a4f69403b41cfd8de1283d7e36ae836974b0b048da5a0a849dfe6433ab91

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://linestata.casa/register.jpg

Targets

    • Target

      dettagli_1311.xlsb

    • Size

      85KB

    • MD5

      d2214a27395a09dd9e994c5dd70b3dfa

    • SHA1

      91619e0072244de266e3b827f8a097d869e1e3db

    • SHA256

      e63ec3f8bf393da29d5225bb6f1f47b7786839784fa2ee5f867f64f8af8462e3

    • SHA512

      28b00d0cb518a3e775a770f1789e83ee37b110a3d34d29cc1439c5d5b9b23e750c91a4f69403b41cfd8de1283d7e36ae836974b0b048da5a0a849dfe6433ab91

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks