General

  • Target

    1331149726_03162021.xls

  • Size

    231KB

  • Sample

    210316-bds1zmj9kx

  • MD5

    149ba9a5dffc5e10b3c16a87742ce5d0

  • SHA1

    0bbc16c5c733167d7f51230c82021e499d06be73

  • SHA256

    420d151699c12c46eff2ab2574667b4ebcdda90e3be6212ba33ea4ec0e8d9030

  • SHA512

    2c633ec241515f09b1653fbb5c42390b1d0e158b35a5be8a85b962e6fcd8b31d3d786b0331f5d2fea87b122a6b8680e2974615078affa6279c82d11ee7f31cdf

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://188.127.235.232/44271.5748371528.dat

xlm40.dropper

http://193.38.54.165/44271.5748371528.dat

xlm40.dropper

http://185.82.218.54/44271.5748371528.dat

xlm40.dropper

http://44271.5748371528.dat

Targets

    • Target

      1331149726_03162021.xls

    • Size

      231KB

    • MD5

      149ba9a5dffc5e10b3c16a87742ce5d0

    • SHA1

      0bbc16c5c733167d7f51230c82021e499d06be73

    • SHA256

      420d151699c12c46eff2ab2574667b4ebcdda90e3be6212ba33ea4ec0e8d9030

    • SHA512

      2c633ec241515f09b1653fbb5c42390b1d0e158b35a5be8a85b962e6fcd8b31d3d786b0331f5d2fea87b122a6b8680e2974615078affa6279c82d11ee7f31cdf

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks