General

  • Target

    catalog-264883487.zip

  • Size

    50KB

  • Sample

    210513-qrgp77c7ex

  • MD5

    cd2e5562a41fbdc9c6a844fbc59cfa55

  • SHA1

    0ef0c3455fd27793030eb6b9e81c53fcaccdc525

  • SHA256

    30edfa240f98e74950ea04b4e99114d7b7ed421ca5b09975f0d1588aa8c33c7a

  • SHA512

    42412147fd13c726ea264dae856419b46f63820528cae9d52809c9a3f1fabb3d4a3d0d7bd0873fa726b56a1fdb4d1c0f15287637a696317926955d333d1902e8

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://smartpalakatva.com/edQsUZOLlE/th.html

xlm40.dropper

https://pilstlcommodities.com/Ov4FlB3lpy/th.html

Targets

    • Target

      catalog-264883487.xls

    • Size

      367KB

    • MD5

      215703b065490d90adbd891b9db320fc

    • SHA1

      065c588163d324c1b76ecc45abd76fc7bc54723e

    • SHA256

      f4f17b573ed8b8dcb740c4ae8feb99e1a95d7df30625e1851769bf10ccb30c31

    • SHA512

      c844f969e5f38fec9f14587acd7194507021dcfa5994c50ea0be1e182373cc1431ce69b8c8240ba59fa7e2698010a99e88f217f4e3d126b4d058946da5128e3b

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks