General

  • Target

    catalog-2131836968.zip

  • Size

    50KB

  • Sample

    210513-kkf475zbhx

  • MD5

    64ee7575115b1b217da59b8722f04a6b

  • SHA1

    43c9b06fe08f2ff82e3bd683df906e9a24b89f9c

  • SHA256

    81d9d4d40c6f3cc82a3b4f61bca0324e76f75a416f2e2271db56b802b341468f

  • SHA512

    bdb42c9ba9096751d611ae0aca9a7addc7b400e9306dcc5f3487bab4cf34b79a6a0eac412ed1d2205607dc6cf1171f9841b1d629578f08b09205af186f6a95fe

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://smartpalakatva.com/edQsUZOLlE/th.html

xlm40.dropper

https://pilstlcommodities.com/Ov4FlB3lpy/th.html

Targets

    • Target

      catalog-2131836968.xls

    • Size

      367KB

    • MD5

      16751532b0208a9b159783dd9486c83f

    • SHA1

      de9f4847c8eb9f0c5fb7f5c2d9e3d4904d44e62c

    • SHA256

      538289db6e2c31428d6f7badd4b89e6f03249a460b410b06c3326183f14c5b3a

    • SHA512

      3be76a98e279215668c24db0de60eab2c17baeeb1c52585141b79e25ec35d41faa0506548675971f2a3d84a4e0956ce6ad6478d464ce345fd1bc1540da475a4c

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks