General

  • Target

    document-1933373955.xls

  • Size

    139KB

  • Sample

    210315-c5hgs4l9r6

  • MD5

    491f8f076ee4c8504ab091dc301ff206

  • SHA1

    1fc006182c646b1fbed9315e7831be630351137b

  • SHA256

    dd3bbce4c5ad7dd71ad4c5664758d6529a241ef2b48241d18b5a87b5c53760ea

  • SHA512

    9a6efd189affe8599ecc50f592a8e1c281a631fcb97f2e48ad6571be483586ad4e2291de68df184269b13c8c2586d181fd8f973f519c95701f48b62fdf1b6f4a

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://zltw15tzezi03nbmru.xyz/w.gif

Targets

    • Target

      document-1933373955.xls

    • Size

      139KB

    • MD5

      491f8f076ee4c8504ab091dc301ff206

    • SHA1

      1fc006182c646b1fbed9315e7831be630351137b

    • SHA256

      dd3bbce4c5ad7dd71ad4c5664758d6529a241ef2b48241d18b5a87b5c53760ea

    • SHA512

      9a6efd189affe8599ecc50f592a8e1c281a631fcb97f2e48ad6571be483586ad4e2291de68df184269b13c8c2586d181fd8f973f519c95701f48b62fdf1b6f4a

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks