General

  • Target

    dettagli_1719.xlsb

  • Size

    78KB

  • Sample

    210315-blzt1vfes2

  • MD5

    064820f6358fd33f8f14e43045e7c735

  • SHA1

    9b55b26fa67d72b0e5fa525d10620bed8fd72c61

  • SHA256

    87149ad8f58e72191cfb287c0a130b1b0d2b0066396e639037798e278b0a9a1b

  • SHA512

    2739ee53680b3cca19689f645204bf8e6216d2c9a33d634fba96a225114a36f1d0856b410851a1795a6307b23c8dc6e1dfc781b09ea6cda5b5bcefdeca7b5238

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://linestata.casa/register.jpg

Targets

    • Target

      dettagli_1719.xlsb

    • Size

      78KB

    • MD5

      064820f6358fd33f8f14e43045e7c735

    • SHA1

      9b55b26fa67d72b0e5fa525d10620bed8fd72c61

    • SHA256

      87149ad8f58e72191cfb287c0a130b1b0d2b0066396e639037798e278b0a9a1b

    • SHA512

      2739ee53680b3cca19689f645204bf8e6216d2c9a33d634fba96a225114a36f1d0856b410851a1795a6307b23c8dc6e1dfc781b09ea6cda5b5bcefdeca7b5238

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks