General

  • Target

    dettagli_745.xlsb

  • Size

    79KB

  • Sample

    210315-bpgacgn2dn

  • MD5

    a89808c7ee3cfdb2dd85c672c7b0392e

  • SHA1

    56f125b322a2b716dff33841973c460f0cbb7880

  • SHA256

    61d703cb25b23a38d3ccbe65660df1ceaf0ca5fb37a899f47831e901091efd75

  • SHA512

    da5b6f7a212b1681779e9075c111c034916b55887016e0aa7637ee5617d9aaf7bda4dd16318605453dc1c967c4aea6324e62c22777269a1331bb309fbaae3c0f

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://linestata.casa/register.jpg

Targets

    • Target

      dettagli_745.xlsb

    • Size

      79KB

    • MD5

      a89808c7ee3cfdb2dd85c672c7b0392e

    • SHA1

      56f125b322a2b716dff33841973c460f0cbb7880

    • SHA256

      61d703cb25b23a38d3ccbe65660df1ceaf0ca5fb37a899f47831e901091efd75

    • SHA512

      da5b6f7a212b1681779e9075c111c034916b55887016e0aa7637ee5617d9aaf7bda4dd16318605453dc1c967c4aea6324e62c22777269a1331bb309fbaae3c0f

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks