General

  • Target

    dettagli_1540.xlsb

  • Size

    63KB

  • Sample

    210315-gfm35zw33e

  • MD5

    731e260800e3ef3a8c2e6f91642c65cb

  • SHA1

    d3de428f3eecb22e6bf3d39738abbe3407c81b2f

  • SHA256

    e063241257a084043b2718acdf6655ad492202b7f190150733bbbba9a00db987

  • SHA512

    4e7762ff0205b888d4483131c7c7933296efa37ff209e994788341a92f85200457f615e70578aebd82bca726ae4e5d9cb5cd03982167043ee929d84bcbe6213e

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://linestata.casa/register.jpg

Targets

    • Target

      dettagli_1540.xlsb

    • Size

      63KB

    • MD5

      731e260800e3ef3a8c2e6f91642c65cb

    • SHA1

      d3de428f3eecb22e6bf3d39738abbe3407c81b2f

    • SHA256

      e063241257a084043b2718acdf6655ad492202b7f190150733bbbba9a00db987

    • SHA512

      4e7762ff0205b888d4483131c7c7933296efa37ff209e994788341a92f85200457f615e70578aebd82bca726ae4e5d9cb5cd03982167043ee929d84bcbe6213e

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks