General

  • Target

    11985824946_03162021.xls

  • Size

    231KB

  • Sample

    210316-eht2v3yaa2

  • MD5

    6e612c34082071fbcf4a26e6cdd453b1

  • SHA1

    264b02bc83f11aed593b524ea8b56eb66e1db631

  • SHA256

    9baa5d12c58ba503651dd97f77b77a266313e62bcc40f31712c4d9d535fc62aa

  • SHA512

    614a2bb9273e57fb35f2a3a134d91371725c95b62872200a7a949a69ce0a513069ccb1df37a984203a37f7592ed5ac557c47268fdd827a0f89b2571eb8835cf9

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://188.127.235.232/44271.6345478009.dat

xlm40.dropper

http://193.38.54.165/44271.6345478009.dat

xlm40.dropper

http://185.82.218.54/44271.6345478009.dat

xlm40.dropper

http://44271.6345478009.dat

Targets

    • Target

      11985824946_03162021.xls

    • Size

      231KB

    • MD5

      6e612c34082071fbcf4a26e6cdd453b1

    • SHA1

      264b02bc83f11aed593b524ea8b56eb66e1db631

    • SHA256

      9baa5d12c58ba503651dd97f77b77a266313e62bcc40f31712c4d9d535fc62aa

    • SHA512

      614a2bb9273e57fb35f2a3a134d91371725c95b62872200a7a949a69ce0a513069ccb1df37a984203a37f7592ed5ac557c47268fdd827a0f89b2571eb8835cf9

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks