General

  • Target

    subscription_1618246083.xlsb

  • Size

    312KB

  • Sample

    210412-pke3mrmdv6

  • MD5

    57aa3c80903144a5756e0483b75c8803

  • SHA1

    d67e66ba33973ce5785194c6fbd7c4aed51dc38d

  • SHA256

    b531240b028bf80d1b244e5750804f5f90affbd740e04fe2674a58eb729e085a

  • SHA512

    0c3edc91c68a27b30c53ddc2da4e02af001bf5d35b92dfddc04208658998a0b3763a3ab8015d17ee8d478b299baf89be565f83cca2ccf0054ad51a7e72f65c74

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      subscription_1618246083.xlsb

    • Size

      312KB

    • MD5

      57aa3c80903144a5756e0483b75c8803

    • SHA1

      d67e66ba33973ce5785194c6fbd7c4aed51dc38d

    • SHA256

      b531240b028bf80d1b244e5750804f5f90affbd740e04fe2674a58eb729e085a

    • SHA512

      0c3edc91c68a27b30c53ddc2da4e02af001bf5d35b92dfddc04208658998a0b3763a3ab8015d17ee8d478b299baf89be565f83cca2ccf0054ad51a7e72f65c74

    Score
    10/10
    • Nloader

      Simple loader that includes the keyword 'cambo' in the URL used to download other families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Nloader Payload

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks