General

  • Target

    catalog-196971597.zip

  • Size

    50KB

  • Sample

    210513-7rwabjfvxs

  • MD5

    3226bbf19e4eab9f3967c439aa225727

  • SHA1

    943a87e3cf63203062214f9a8d2785f54ae64994

  • SHA256

    3876c68df7762ec693812dd2759108355b309831de2df78cfdb1d21c6432d2a8

  • SHA512

    d1aa074b1cbd94bd27da7edb49e3d8f78aca1ee3108ca70d3efdd0cd3a6d93dddf026bc9e5b9a048cb42f05a60b6fdce130ef019ef05e4bbcdb679ac38e8f5ad

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://smartpalakatva.com/edQsUZOLlE/th.html

xlm40.dropper

https://pilstlcommodities.com/Ov4FlB3lpy/th.html

Targets

    • Target

      catalog-196971597.xls

    • Size

      367KB

    • MD5

      b45f6251d7b4eebb0de0c41b83ac8593

    • SHA1

      5a3b90ec277cd751afbb28a068bdeeef9c723350

    • SHA256

      d3ff5935684be45f07448213f70a8c14b4000e54d642638bbd35120ad829f3ea

    • SHA512

      55c5ae98efb28477aa24326aa5fb4901738d52463628b393f98e42040c3a78b1de5e759ec3b19e72251183c106bc1d71d54d1ca2fb625fa799242d186e84dfbd

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks