General

  • Target

    Documents455.xlsm

  • Size

    57KB

  • Sample

    210315-y944sfh7q6

  • MD5

    48f94f4fccda26ad7944d041729923ae

  • SHA1

    0548fd594ef2ab9d0e200dd411893882b94b8940

  • SHA256

    ec928e9f10b2097621f5a01e4f4a902777365b7a07765a5f94348387d0bb951b

  • SHA512

    b14624d2ae5e7352dc7105d40fb2d270f47f8eb1567d66397bd1584f4dc966b4d27a6861e24d04376b7b664f65ce188cc36dcfccebfe23be8ecb2482f5262d1f

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://cfkko03vvxohq03taep.com/index.gif

Targets

    • Target

      Documents455.xlsm

    • Size

      57KB

    • MD5

      48f94f4fccda26ad7944d041729923ae

    • SHA1

      0548fd594ef2ab9d0e200dd411893882b94b8940

    • SHA256

      ec928e9f10b2097621f5a01e4f4a902777365b7a07765a5f94348387d0bb951b

    • SHA512

      b14624d2ae5e7352dc7105d40fb2d270f47f8eb1567d66397bd1584f4dc966b4d27a6861e24d04376b7b664f65ce188cc36dcfccebfe23be8ecb2482f5262d1f

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks