General

  • Target

    dettagli_2621.xlsb

  • Size

    72KB

  • Sample

    210315-nvnxlr2sc6

  • MD5

    18a30ddb789abef63fcb4584faab7719

  • SHA1

    e60e2da43be789269fbe744a44950f2d6f57fc7b

  • SHA256

    9f635e8a769dac16e1aad62fe7d2e9ee5ed7b6ae725044f63e7d8d15919eccdc

  • SHA512

    45fa1abf876105639dcbadfa94bda25d77f8f7554b1728104e8a5eca37449d007d6e55679bfabef10f0488363b000a50569b2220c023705d4522582aec78f8da

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://linestata.casa/register.jpg

Targets

    • Target

      dettagli_2621.xlsb

    • Size

      72KB

    • MD5

      18a30ddb789abef63fcb4584faab7719

    • SHA1

      e60e2da43be789269fbe744a44950f2d6f57fc7b

    • SHA256

      9f635e8a769dac16e1aad62fe7d2e9ee5ed7b6ae725044f63e7d8d15919eccdc

    • SHA512

      45fa1abf876105639dcbadfa94bda25d77f8f7554b1728104e8a5eca37449d007d6e55679bfabef10f0488363b000a50569b2220c023705d4522582aec78f8da

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks