General

  • Target

    sample (3).xls

  • Size

    233KB

  • Sample

    210316-f9f1hldcda

  • MD5

    7dad6e822b5c1ecb7213f8fff393343b

  • SHA1

    915cfef6c4980aef9dd27de5126d3bd526c85d09

  • SHA256

    01bda03412e26c8cc432de1d5837dc69cc538a73080ac0bfbf3708619fdf7ef6

  • SHA512

    5760437c44306d7f3a83f3b57db4faf84612442d3673350fe614db0ea49240418870f1ff6f92774521bafd41320a27a14b4fee957908ded6f26662f253553f9e

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://188.127.254.114/44271.0488724537.dat

xlm40.dropper

http://185.82.219.160/44271.0488724537.dat

xlm40.dropper

http://45.140.146.34/44271.0488724537.dat

Targets

    • Target

      sample (3).xls

    • Size

      233KB

    • MD5

      7dad6e822b5c1ecb7213f8fff393343b

    • SHA1

      915cfef6c4980aef9dd27de5126d3bd526c85d09

    • SHA256

      01bda03412e26c8cc432de1d5837dc69cc538a73080ac0bfbf3708619fdf7ef6

    • SHA512

      5760437c44306d7f3a83f3b57db4faf84612442d3673350fe614db0ea49240418870f1ff6f92774521bafd41320a27a14b4fee957908ded6f26662f253553f9e

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks