General

  • Target

    general_1828.xlsb

  • Size

    82KB

  • Sample

    210315-ldbdzd6t7x

  • MD5

    ccc549343f05d002671d43e6a8f4252b

  • SHA1

    3c1e669672af9905061560116e43d59425777990

  • SHA256

    5d678f4e868ba941bdac1210520972363391545d2e689a55986d9a2689b831f1

  • SHA512

    3edeb1cdf5ef2dbd4cc580bde0be5c76662c6655513c8d76e5aa4f015663b123fb3e5599f573f54121211edc85edebab75aa0ec945640218e6fa7f43fe83a951

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://statisonline.casa/register.jpg

Targets

    • Target

      general_1828.xlsb

    • Size

      82KB

    • MD5

      ccc549343f05d002671d43e6a8f4252b

    • SHA1

      3c1e669672af9905061560116e43d59425777990

    • SHA256

      5d678f4e868ba941bdac1210520972363391545d2e689a55986d9a2689b831f1

    • SHA512

      3edeb1cdf5ef2dbd4cc580bde0be5c76662c6655513c8d76e5aa4f015663b123fb3e5599f573f54121211edc85edebab75aa0ec945640218e6fa7f43fe83a951

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks