General

  • Target

    catalog-2087191249.zip

  • Size

    50KB

  • Sample

    210513-6ftbazrw2x

  • MD5

    1dbd7164094615e39aaed441ae704191

  • SHA1

    4ce73b580ebe97c800d7b3236b590b9af165fbf9

  • SHA256

    608bdfd3e0badc9647cdfb15f80e08304799b61ca4d7aebaebbe7dc2a140f995

  • SHA512

    8f97330ec5e7f869f879b27a33b3d8fd88751b83efbeccddf1dc3505db0427c372108a4b00503803fb127e82891fa7a8a8abe9c599677bfaf47b897a9c753dea

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://smartpalakatva.com/edQsUZOLlE/th.html

xlm40.dropper

https://pilstlcommodities.com/Ov4FlB3lpy/th.html

Targets

    • Target

      catalog-2087191249.xls

    • Size

      367KB

    • MD5

      3ad535735bd6c4f47802a9264f28da1f

    • SHA1

      71240b697a58274c4d1843c0c41742419a901ce9

    • SHA256

      fc76befecfbf3d53e5dc772d2b4bc44b20966e892d10f1cc2e56e4760f478a6a

    • SHA512

      43bd9e42f0a6b2b8197ca8c8006746d4760fe8e0b6b48ca8d1ff660875adffe514f2e84198830b4dbd2207087f79f5c5fcfaedcc418a86717bb9b71f451dc356

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks