General

  • Target

    general_1632.xlsb

  • Size

    82KB

  • Sample

    210315-p66kn3bg22

  • MD5

    f235e2d66307244100d0f14430c3e501

  • SHA1

    f513b73dac3f4f08b0016973cca05d34e0e3883e

  • SHA256

    60ca78fbf084dd3df00eabb0409ab3e9967c2e7d869f0ba6d3fc5cb1f55ab865

  • SHA512

    1937f278e2c7c4dd56ce00f1651bbb3279d56b029fdd1a6c40e5e6acbbd702291bc713235afe7b8b8acaa7ff71e4295d0f62747af10190649f5ae255fd1fcfb8

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://statisonline.casa/register.jpg

Targets

    • Target

      general_1632.xlsb

    • Size

      82KB

    • MD5

      f235e2d66307244100d0f14430c3e501

    • SHA1

      f513b73dac3f4f08b0016973cca05d34e0e3883e

    • SHA256

      60ca78fbf084dd3df00eabb0409ab3e9967c2e7d869f0ba6d3fc5cb1f55ab865

    • SHA512

      1937f278e2c7c4dd56ce00f1651bbb3279d56b029fdd1a6c40e5e6acbbd702291bc713235afe7b8b8acaa7ff71e4295d0f62747af10190649f5ae255fd1fcfb8

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks