General

  • Target

    inform_1947.xlsb

  • Size

    63KB

  • Sample

    210315-k7axlvgfxs

  • MD5

    8a45db195455249ec54f996d552f93bd

  • SHA1

    f66dd2cfae0f4447e3dc26745eb3f330a07c4184

  • SHA256

    9178c52f3b0fd561a2dc1ed1f075dc647dbd8aa12b89355b159a16706f383b18

  • SHA512

    65a8d73d97ba8f8868a5f7d7905b0959b14a497f69e7349e8d7160800a83b4f901c655f094fdc85b95ec49ca8a449baf9a33ebc0c719482ec3747d3f9ea15e63

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://onlinestatis.casa/signup.jpg

Targets

    • Target

      inform_1947.xlsb

    • Size

      63KB

    • MD5

      8a45db195455249ec54f996d552f93bd

    • SHA1

      f66dd2cfae0f4447e3dc26745eb3f330a07c4184

    • SHA256

      9178c52f3b0fd561a2dc1ed1f075dc647dbd8aa12b89355b159a16706f383b18

    • SHA512

      65a8d73d97ba8f8868a5f7d7905b0959b14a497f69e7349e8d7160800a83b4f901c655f094fdc85b95ec49ca8a449baf9a33ebc0c719482ec3747d3f9ea15e63

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks