General

  • Target

    modalita_2856.xlsb

  • Size

    70KB

  • Sample

    210316-nyq2sya286

  • MD5

    7a681936cd2d1120be10991b89776c65

  • SHA1

    99afccb9ef18e909d576364ce201ac965188f8bd

  • SHA256

    6e67e32cd54565dcf369f52a0617a7c55f0446a4ed1fbf7878f98512e278ccaa

  • SHA512

    4eeeee6649e838a15fe59fbb6741aa56e9b53797a0d18f2b9d1a901eec0d21b5027987b8bf22953eedab275fac08c88222906045f9be3a31fbd74b4e1fdcf352

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://comunicaz.casa/signup.jpg

Targets

    • Target

      modalita_2856.xlsb

    • Size

      70KB

    • MD5

      7a681936cd2d1120be10991b89776c65

    • SHA1

      99afccb9ef18e909d576364ce201ac965188f8bd

    • SHA256

      6e67e32cd54565dcf369f52a0617a7c55f0446a4ed1fbf7878f98512e278ccaa

    • SHA512

      4eeeee6649e838a15fe59fbb6741aa56e9b53797a0d18f2b9d1a901eec0d21b5027987b8bf22953eedab275fac08c88222906045f9be3a31fbd74b4e1fdcf352

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks