General

  • Target

    catalog-2008551307.zip

  • Size

    50KB

  • Sample

    210513-gnl9eayt7n

  • MD5

    2c7abafbacd92228965d4e5f0703c006

  • SHA1

    2c39b9380493ae0df0b4dab0e478b673bb30d75f

  • SHA256

    5e173d83e4c40a537b896edd9e5f5ee5f4882c96ff7eb8f7945db4ed75e4a47a

  • SHA512

    6bdd52d74773bb601ff3387e538acdd38e8247eadec4e447259a4badc90193794201f48581266002abf15488170d68ed5889ac171544ebb050456c6546da946c

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://smartpalakatva.com/edQsUZOLlE/th.html

xlm40.dropper

https://pilstlcommodities.com/Ov4FlB3lpy/th.html

Targets

    • Target

      catalog-2008551307.xls

    • Size

      367KB

    • MD5

      e376664d5625944a41e4940de7794fb4

    • SHA1

      3df9bd129da02cc195fea31bdcc18a0d6c4614c0

    • SHA256

      058bceb798d4005018e53e1805a94e59c5336e4b8f71c962b155cfae7719b8e2

    • SHA512

      7ec0d1a5e7048ad79c5c68e785b9aac9d269e200c06e11480670dba0de7c06699b7b869470a60516c3cea78e7b0e1af1c2f3d9f865d981421dcb7cddeee4c00a

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks