General

  • Target

    modal_718.xlsb

  • Size

    79KB

  • Sample

    210316-lcdcya9g4j

  • MD5

    9e72681925e64f5de7c1549c1b9cb3e2

  • SHA1

    cac2cced890bae7a9ca73702f753c974dc640898

  • SHA256

    5958cb7775ebbdcb84a6b278dc5074cad2dd55ce9eb06c7aeed4f08077470bd5

  • SHA512

    49d5060e1c3b2ebf0c6c1e823f0aa5ca64629dc0b72ba0a83cdced129eda3607811bb83cb9f2070b2acd4fde9a99e23f174a953bc025df6e1847806e4e56dbdc

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://trimestre.casa/register.jpg

Targets

    • Target

      modal_718.xlsb

    • Size

      79KB

    • MD5

      9e72681925e64f5de7c1549c1b9cb3e2

    • SHA1

      cac2cced890bae7a9ca73702f753c974dc640898

    • SHA256

      5958cb7775ebbdcb84a6b278dc5074cad2dd55ce9eb06c7aeed4f08077470bd5

    • SHA512

      49d5060e1c3b2ebf0c6c1e823f0aa5ca64629dc0b72ba0a83cdced129eda3607811bb83cb9f2070b2acd4fde9a99e23f174a953bc025df6e1847806e4e56dbdc

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks