General

  • Target

    document-1030346586.rar

  • Size

    30KB

  • Sample

    210315-k3s77x1fg2

  • MD5

    4ac143b516970c75f61271d741f9c143

  • SHA1

    a881b1d07e5f9baa27dba044abc7431271fdb2aa

  • SHA256

    ecdedb39ae3377bab81228599a8a6ee0172e7d0aedb7b5ed39a68d20a49d6579

  • SHA512

    8ee0d02177ba245650cdda25caf33c384b2c789f964b6341dc4d35623922fd62ff047105f0ac12ac57c631dfd61ee0cb6f5ebfc92bbd788e7f3aaf8a7d8f6143

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://lbgyn15pchoit03azhs.xyz/w.gif

Targets

    • Target

      document-1030346586.xls

    • Size

      139KB

    • MD5

      4491b6b6bda1abcb7d3561186ff756b1

    • SHA1

      c96cc041d88d61ef4b597a24f4e77c118aa929d0

    • SHA256

      91a0fc510443d97786114e2e903ab496ee3df5052763a136c7b1b0c7232b9419

    • SHA512

      dc15a2e0d0576ac6b9a8019487bb1ca70fe597bb77d47327139c83c70ebb060b4e675506e23b2d3a09a6edea55860fb32d037298e75c386987b9b9f10f5eb177

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks