General

  • Target

    catalog-241005140.zip

  • Size

    50KB

  • Sample

    210513-r92mjztc6x

  • MD5

    79eb218541fdebefdfbafb671ab741e8

  • SHA1

    c1e54d7863dd3b8dbd3ab56df1bc35bd4553e5d6

  • SHA256

    339c3bc40f9935d1be78ea13d36b331c82e5cb8fecf0455691592700844a7c79

  • SHA512

    8d70e93f7cf182066428dd5d167415a81fab251f0c2f3986f032afc53b24a8fdf64639a3f997ef329431bdb24d0486e7433ab2d6ac5ae1fe6d5294b503a26950

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://smartpalakatva.com/edQsUZOLlE/th.html

xlm40.dropper

https://pilstlcommodities.com/Ov4FlB3lpy/th.html

Targets

    • Target

      catalog-241005140.xls

    • Size

      367KB

    • MD5

      688ad6783056fd0380200879beb0e915

    • SHA1

      f3b9a70aac8dabbd46fa22d2f95d96faa911fec8

    • SHA256

      589255722398bef81da16a4b9e34e7d3b23666ba55ecd6bc90885d58fc63f2c4

    • SHA512

      3712c554d1d234bfa2a98600c565975a46a7b32b9f9a4270c96f5e15836834334db4f9cfee04e4c707129957559bdd6d74bb82ab5ab6a5c5171fda64c2e1e6f1

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks