General

  • Target

    document-2128273336.xls

  • Size

    139KB

  • Sample

    210315-bylx5pg61a

  • MD5

    4ad809185810ce924a96d99e23400ad1

  • SHA1

    33784a44312fa7d6a8b534450aa7f02ab710f3cb

  • SHA256

    75002f20cd76c280642f70fdf8e0889eb250d773301929b351ab8c19a16dc33d

  • SHA512

    0919e3ca80cc0f2469c0e19550d4647e2648c8e82d47fcfec2d3b0dc73b812b103ab78e9d93134d5c21df8ef43d8bff2c2838a3fc6ba2cfe54ccf319d405c96d

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://zltw15tzezi03nbmru.xyz/w.gif

Targets

    • Target

      document-2128273336.xls

    • Size

      139KB

    • MD5

      4ad809185810ce924a96d99e23400ad1

    • SHA1

      33784a44312fa7d6a8b534450aa7f02ab710f3cb

    • SHA256

      75002f20cd76c280642f70fdf8e0889eb250d773301929b351ab8c19a16dc33d

    • SHA512

      0919e3ca80cc0f2469c0e19550d4647e2648c8e82d47fcfec2d3b0dc73b812b103ab78e9d93134d5c21df8ef43d8bff2c2838a3fc6ba2cfe54ccf319d405c96d

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks