General

  • Target

    catalog-228950226.zip

  • Size

    50KB

  • Sample

    210513-9q98pe1w4a

  • MD5

    5508b0f90376f49de1c7d44e5f4bb2a4

  • SHA1

    c4b4edadb4ab20077ae8ee25947c459eabccc6ab

  • SHA256

    c5b0df46075cba61ef85639d38770db86e2d9fb36281f488df45ce1816555109

  • SHA512

    83705101f2d2dc444616c9b8a565aef579fbbb3bb5fc10f73bff0108f5748d9610f4397b39cb0e710debb9a006aa8406f115f89adccc069bb9f76ee73bf06d90

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://smartpalakatva.com/edQsUZOLlE/th.html

xlm40.dropper

https://pilstlcommodities.com/Ov4FlB3lpy/th.html

Targets

    • Target

      catalog-228950226.xls

    • Size

      367KB

    • MD5

      627b3d036aca4594e79d87c368592319

    • SHA1

      998597b00a33173b4b36ccf3aee397b84577c671

    • SHA256

      41ba4b5f9b71c4f3562a7d16bb9681f9714203c3c627d9e59e647b923a66d13e

    • SHA512

      845a916a8aa9d00e3dad5f336dd9a6def3e00d968f7a3502d9edaccc2d4cc9fdf09b7621f0006c1d1dac7b1b02fda2b65b92e3717dc2832372dbe517e928585b

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks