General

  • Target

    document-1761664386.xls

  • Size

    138KB

  • Sample

    210316-23hx9kzmhs

  • MD5

    1fc8e84958d40886d6c701514c655cbe

  • SHA1

    55ba8bc1bcb801883ddd7bb1fd8ffa41672baf2d

  • SHA256

    3fcb61eb0a502ebda86dc313e7ce31a0ea2098b3172404afaa620f4c75b84d67

  • SHA512

    3a0cb6a74a5e14d104c8d09badd6e59d86d1fcd662d2810fc4ec70f3de1d60645b877a1deaadcb2511df311ec7e1282c592ce15900e0d4f635e31efa15bac319

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://bqx12lnjk03rrdio.xyz/i.gif

Targets

    • Target

      document-1761664386.xls

    • Size

      138KB

    • MD5

      1fc8e84958d40886d6c701514c655cbe

    • SHA1

      55ba8bc1bcb801883ddd7bb1fd8ffa41672baf2d

    • SHA256

      3fcb61eb0a502ebda86dc313e7ce31a0ea2098b3172404afaa620f4c75b84d67

    • SHA512

      3a0cb6a74a5e14d104c8d09badd6e59d86d1fcd662d2810fc4ec70f3de1d60645b877a1deaadcb2511df311ec7e1282c592ce15900e0d4f635e31efa15bac319

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v6

Tasks