General

  • Target

    Fattura.xlsb

  • Size

    249KB

  • Sample

    210416-5ktpd5x6ks

  • MD5

    cfb756f36616e64f4da99dce90b25661

  • SHA1

    00f48058178e506ad535f7f5c00b632c41ba4b8f

  • SHA256

    051770ec73c6bb36b839af3fcdc2e28e14f8e8c24f77f89bdc034c19f05516ed

  • SHA512

    fce764ec2d370a3709af0a2a8e1eca125e175e3c14849362a9d301b13f631a44d3dbb2289d1cb224f1357aeaa0da42b0d6c54c544d7c226ca6b9d6f5d6a0a9e6

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      Fattura.xlsb

    • Size

      249KB

    • MD5

      cfb756f36616e64f4da99dce90b25661

    • SHA1

      00f48058178e506ad535f7f5c00b632c41ba4b8f

    • SHA256

      051770ec73c6bb36b839af3fcdc2e28e14f8e8c24f77f89bdc034c19f05516ed

    • SHA512

      fce764ec2d370a3709af0a2a8e1eca125e175e3c14849362a9d301b13f631a44d3dbb2289d1cb224f1357aeaa0da42b0d6c54c544d7c226ca6b9d6f5d6a0a9e6

    Score
    10/10
    • Nloader

      Simple loader that includes the keyword 'campo' in the URL used to download other families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Nloader Payload

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks