General

  • Target

    societ_194.xlsb

  • Size

    71KB

  • Sample

    210315-h9qrdpr2y6

  • MD5

    a2f4eb67fd27ceceee347688796bf13e

  • SHA1

    b9b2a520f485e386f158261869277b5cd2568c4c

  • SHA256

    59253dd636251a8e1ffd0ab7343f8cb0b2b341a205f70cc0cec35997a720366f

  • SHA512

    a0c80b99b5461b7d6cffdf6e432f75db7e0a50abd60e4d95cca7cc789fe37f73187bae8c0e69f1fac45e04f6461d04e199c1216b6bf6e7dbc54a9cae176138ea

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://linestata.bar/register.jpg

Targets

    • Target

      societ_194.xlsb

    • Size

      71KB

    • MD5

      a2f4eb67fd27ceceee347688796bf13e

    • SHA1

      b9b2a520f485e386f158261869277b5cd2568c4c

    • SHA256

      59253dd636251a8e1ffd0ab7343f8cb0b2b341a205f70cc0cec35997a720366f

    • SHA512

      a0c80b99b5461b7d6cffdf6e432f75db7e0a50abd60e4d95cca7cc789fe37f73187bae8c0e69f1fac45e04f6461d04e199c1216b6bf6e7dbc54a9cae176138ea

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks