General

  • Target

    document-61746150.xls

  • Size

    139KB

  • Sample

    210315-j7dfdcwa6j

  • MD5

    5de27c2f774acc114538fd872b44ebf5

  • SHA1

    db674003241ed8a426aa7c3538f8423dae0d9751

  • SHA256

    8a976336e807b03cf0209c424171dcb9b21e57b15618a81577212bfa13c9d921

  • SHA512

    61abd2f0a1ffe5f33deb3315e405f6668ccc2e85162b2e62b6111324ffff200799e64eba64f17572639f4af3b4233b3d4eb4a7e39bd54269c32311488d3acae6

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://zltw15tzezi03nbmru.xyz/w.gif

Targets

    • Target

      document-61746150.xls

    • Size

      139KB

    • MD5

      5de27c2f774acc114538fd872b44ebf5

    • SHA1

      db674003241ed8a426aa7c3538f8423dae0d9751

    • SHA256

      8a976336e807b03cf0209c424171dcb9b21e57b15618a81577212bfa13c9d921

    • SHA512

      61abd2f0a1ffe5f33deb3315e405f6668ccc2e85162b2e62b6111324ffff200799e64eba64f17572639f4af3b4233b3d4eb4a7e39bd54269c32311488d3acae6

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks