General

  • Target

    _____.xlsb

  • Size

    225KB

  • Sample

    210411-w1lyba9clx

  • MD5

    0abe41c27fa3f1e62b74ff4903887d86

  • SHA1

    3707fed2be2ec70152bdc5cd691137a7d6b62013

  • SHA256

    67c35a01ebe2933d5772677793719c2702ef18274e84fc188f5eb6eee4f32752

  • SHA512

    0b6bc4a8f420c9cb463fa10ec1cfe64cf90ee132ee2f46ec739c381e0d2a21d848896cf1d89b88de9fb6d7b88c2ebc1c497ee8cba08205802c372da5e707f7a9

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      _____.xlsb

    • Size

      225KB

    • MD5

      0abe41c27fa3f1e62b74ff4903887d86

    • SHA1

      3707fed2be2ec70152bdc5cd691137a7d6b62013

    • SHA256

      67c35a01ebe2933d5772677793719c2702ef18274e84fc188f5eb6eee4f32752

    • SHA512

      0b6bc4a8f420c9cb463fa10ec1cfe64cf90ee132ee2f46ec739c381e0d2a21d848896cf1d89b88de9fb6d7b88c2ebc1c497ee8cba08205802c372da5e707f7a9

    Score
    10/10
    • Nloader

      Simple loader that includes the keyword 'cambo' in the URL used to download other families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Nloader Payload

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks