General

  • Target

    subscription_number.xlsb

  • Size

    254KB

  • Sample

    210414-wa56mlcrcx

  • MD5

    31db3473a93ac2831bd895b0d83154ec

  • SHA1

    aaef0d7e0bd4094c0ecbc19c69cc85954f209820

  • SHA256

    aae2cf00546070edda9898e8439236bb06001d46d2649d8a859a5952bb5229dd

  • SHA512

    4a101bb696343a2ffc89834b366d411e0398ed2f06091bbbb32fe1caa3ec39e3ac95782a2235ccff3bafa8c1801b09616921cb228fe7eb3f6c253b20db138a65

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      subscription_number.xlsb

    • Size

      254KB

    • MD5

      31db3473a93ac2831bd895b0d83154ec

    • SHA1

      aaef0d7e0bd4094c0ecbc19c69cc85954f209820

    • SHA256

      aae2cf00546070edda9898e8439236bb06001d46d2649d8a859a5952bb5229dd

    • SHA512

      4a101bb696343a2ffc89834b366d411e0398ed2f06091bbbb32fe1caa3ec39e3ac95782a2235ccff3bafa8c1801b09616921cb228fe7eb3f6c253b20db138a65

    Score
    10/10
    • Nloader

      Simple loader that includes the keyword 'campo' in the URL used to download other families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Nloader Payload

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks