General

  • Target

    document-1465816511.xls

  • Size

    139KB

  • Sample

    210315-gzlq1srj32

  • MD5

    a88a895ba88e0c8baa37872fa4a29d23

  • SHA1

    227ae3269ba98ccc54ecd1f03632f96a3a740cda

  • SHA256

    3e342d36bcdedfead10f39274d82b8a61cff0a07f0f1c5918745c7e6ad82f0d9

  • SHA512

    fc88913b5b805c3295bc2df532cb7c58372e5f1e4bd07d8f9eb8e7a3e7ccca5a8bcb604cb7f0c9481d3663297ab1b6b2fc3a4053c16409889a96dd1be3f073ff

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://zltw15tzezi03nbmru.xyz/w.gif

Targets

    • Target

      document-1465816511.xls

    • Size

      139KB

    • MD5

      a88a895ba88e0c8baa37872fa4a29d23

    • SHA1

      227ae3269ba98ccc54ecd1f03632f96a3a740cda

    • SHA256

      3e342d36bcdedfead10f39274d82b8a61cff0a07f0f1c5918745c7e6ad82f0d9

    • SHA512

      fc88913b5b805c3295bc2df532cb7c58372e5f1e4bd07d8f9eb8e7a3e7ccca5a8bcb604cb7f0c9481d3663297ab1b6b2fc3a4053c16409889a96dd1be3f073ff

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks