General

  • Target

    dettagli_2986.xlsb

  • Size

    69KB

  • Sample

    210315-jq9e3n9tgs

  • MD5

    b47e26e5346c0f9adb6ce6de7211a86b

  • SHA1

    521045d971726a40e237c313d2d916a6312ba759

  • SHA256

    e9210de0b730ef35355f341c3cd2fa4686f3a36668fa14cde20d0c65f643865f

  • SHA512

    ab332f21c3214d88855ecd7b60d0204e2595102a2e098e6c4d5af755e49a2194bca1f3885aeb94ed9f8e10f907778127f0fdeb698e83b3b7760baf28a0934de5

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://linestata.casa/register.jpg

Targets

    • Target

      dettagli_2986.xlsb

    • Size

      69KB

    • MD5

      b47e26e5346c0f9adb6ce6de7211a86b

    • SHA1

      521045d971726a40e237c313d2d916a6312ba759

    • SHA256

      e9210de0b730ef35355f341c3cd2fa4686f3a36668fa14cde20d0c65f643865f

    • SHA512

      ab332f21c3214d88855ecd7b60d0204e2595102a2e098e6c4d5af755e49a2194bca1f3885aeb94ed9f8e10f907778127f0fdeb698e83b3b7760baf28a0934de5

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks