General

  • Target

    catalog-250355479.zip

  • Size

    50KB

  • Sample

    210513-6mve1jlyse

  • MD5

    a4e99373eebdd42dc6ce7228ed20fa43

  • SHA1

    7cb0eb008935ce23b8575312c57d93aa67046659

  • SHA256

    c5ca585d11cbe3105aaf9187f308a29da6ad83c30625726b4f4c176eab60baeb

  • SHA512

    707850c6e06c66db8f0f2b67fcc383e12eb29aa223ca831366f462c579351fd62b5e3471fdf63af19e2caed1cb669261e9db9f0bf73faf4f76b11f5ab691552a

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://smartpalakatva.com/edQsUZOLlE/th.html

xlm40.dropper

https://pilstlcommodities.com/Ov4FlB3lpy/th.html

Targets

    • Target

      catalog-250355479.xls

    • Size

      367KB

    • MD5

      3383ba2bb29cb5ccb5d2d062d0c81c91

    • SHA1

      9fcadeb88dab3f3eb873d6e1c127d341b151afea

    • SHA256

      ce1817251620fb293c886edcf300ce04de866b82d56493ddd24a130a26ca3c73

    • SHA512

      d5dcad1f22e297ef3e9963b02e3b435a6d1e55f5910a15693cb7f13ede88528be5f8b951c1efa8c45a02d5845ea23ca94a4b22ed6c2d068a41a9412bc56634db

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks