General

  • Target

    inform_2077.xlsb

  • Size

    60KB

  • Sample

    210315-jd53tzbk2s

  • MD5

    82f6cf22800ef846039efb29938c1e4e

  • SHA1

    f8172674c0c761b67350d9811735e3762c957e72

  • SHA256

    0c4bd354fb87a6770d649f382821dc4b62eb0c91cce45d9646cf9c535161d22c

  • SHA512

    752585a81518e64a8814b26736ca90fb5a050c53db656136722fb2e3be7a6520d356c8b417f6de1fb6fb56ef0e4529ed532e48155b9c3d5dd36d6a03d4f1d3ed

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://onlinestatis.casa/signup.jpg

Targets

    • Target

      inform_2077.xlsb

    • Size

      60KB

    • MD5

      82f6cf22800ef846039efb29938c1e4e

    • SHA1

      f8172674c0c761b67350d9811735e3762c957e72

    • SHA256

      0c4bd354fb87a6770d649f382821dc4b62eb0c91cce45d9646cf9c535161d22c

    • SHA512

      752585a81518e64a8814b26736ca90fb5a050c53db656136722fb2e3be7a6520d356c8b417f6de1fb6fb56ef0e4529ed532e48155b9c3d5dd36d6a03d4f1d3ed

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks