General

  • Target

    catalog-2029944831.zip

  • Size

    50KB

  • Sample

    210513-e3j5vphntn

  • MD5

    d4767ced40554ed3501cafd8f3abf4bd

  • SHA1

    5b384dbcc4b1ca5cc4a62f24a5a1fe8f2e4238bf

  • SHA256

    1db2cc076d0388ebd2a05f1409f44d3576bbddd3118d789b04c2181364c30c89

  • SHA512

    1559d3bac84b4efec271f3391f29d0c7169b78716402c3591ee315f062d26ad751b4dbc108548537579b7eee8c278cb834921027f9e5eac9a6a10c18c1b7f32d

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://smartpalakatva.com/edQsUZOLlE/th.html

xlm40.dropper

https://pilstlcommodities.com/Ov4FlB3lpy/th.html

Targets

    • Target

      catalog-2029944831.xls

    • Size

      367KB

    • MD5

      ae4a7a4a50621c31e771b589f800cfd7

    • SHA1

      21020b2f44299266de362ae8817e08a6122e2c6b

    • SHA256

      d426f9e1657aa8a09fa039fe9c144fbe5bcb1ce054d8e63c5f9d7a7cbcd74bce

    • SHA512

      f80034fc0835c0b18e9f4d5926736471811bc8953702cc7554116e8168ff33c9a9346e2372f8fabef6d3ce5b331f779d5f532ddabf2f6a42920a71d2877e554c

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks