General

  • Target

    Info_146854.xlsb_0EE5D05A5FC746C0DF8BC1536808E10E.zip

  • Size

    224KB

  • Sample

    210315-eytx7tsy56

  • MD5

    a94ef931b519dd9c54bebdb467b2f466

  • SHA1

    b35d4b41ad7e5e8663ce648edbd78356b306b3ec

  • SHA256

    5fc29741107579e4a23c4e65c5ff488f1fad277276ac0eab07de0bb2f09d6c10

  • SHA512

    e4987f74d1251259cc04fa10fb41cae7ed6eed68e6921d33e150d1a805aef456e2c4652b128954ba6203bd1f59266cf21a3aef075ea03f4908ebaa4d7965d56a

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://195.123.222.188/campo/e/e1

Targets

    • Target

      Info_146854.xlsb

    • Size

      233KB

    • MD5

      0ee5d05a5fc746c0df8bc1536808e10e

    • SHA1

      80d8c320911b0bc92227bcdc05abb4f7dd67e25d

    • SHA256

      5601383e0e5ac72d719ec684afad8e23f390435e31eaa9e726348f24180e1974

    • SHA512

      44a011b8b871508b123005c0596f19ad6fe3397bed99e18a406615e80f8564a16e67d3ff35790e03d3d184ae064077b85483ba4078ed3b040efaeb1bf6eeb6b9

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks