General

  • Target

    dettagli_678.xlsb

  • Size

    83KB

  • Sample

    210315-my3cc7hc76

  • MD5

    27eed9b95ce12d61e67046c1cae86d8a

  • SHA1

    0bb4203aa0851412702619e7880fc867027c1596

  • SHA256

    4d4b6fbf8392b5b2b0145fb775c8e2774370494b84c7d30da68fa12639c08039

  • SHA512

    e547b1850d4f147bc82812a8b04ed3011cf720f1cfe31f660dfc2ea520ea152f3923727e5136cee5464cc638b5e36dd5500171dbd1e33ce4ea04ccce3701acb7

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://linestata.casa/register.jpg

Targets

    • Target

      dettagli_678.xlsb

    • Size

      83KB

    • MD5

      27eed9b95ce12d61e67046c1cae86d8a

    • SHA1

      0bb4203aa0851412702619e7880fc867027c1596

    • SHA256

      4d4b6fbf8392b5b2b0145fb775c8e2774370494b84c7d30da68fa12639c08039

    • SHA512

      e547b1850d4f147bc82812a8b04ed3011cf720f1cfe31f660dfc2ea520ea152f3923727e5136cee5464cc638b5e36dd5500171dbd1e33ce4ea04ccce3701acb7

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks