General

  • Target

    catalog-304472226.zip

  • Size

    50KB

  • Sample

    210513-jy5ff8wdsn

  • MD5

    ec4c53930a707b4a1f7a022b8c9b8ac6

  • SHA1

    0e8ed49d969b13ab6c8f614a5306ca632746ab4c

  • SHA256

    2cc8487e2bddce36594cb5353e9b62ee34567d3b10421e5b6f1506412b1dcb24

  • SHA512

    570a96a19a08fdbb043214524c0b86916aec3f92aaaf24704f6687f4bdb47b21bb18fd86c0d4ac47ff21c68026fbda92daa2339af0f328c571981a9d10455dd9

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://smartpalakatva.com/edQsUZOLlE/th.html

xlm40.dropper

https://pilstlcommodities.com/Ov4FlB3lpy/th.html

Targets

    • Target

      catalog-304472226.xls

    • Size

      367KB

    • MD5

      a2ae007b310460d9aa2ad66b4004a68f

    • SHA1

      6f755785a20ab943b6e6534471c9af0aec8c3227

    • SHA256

      90ecfdcdc3b8d4fd6f352b6cb0072842b9989803fa13fd95b2d53a280c8a112a

    • SHA512

      db5a050fac0b005c97a2a6e846873a5b78965c0078d67516a5bd2596ffac4a389598bfa3281792752702d8cca519fb3134c7f1a13dd4238fdc3efba46961be37

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks