General

  • Target

    catalog-2005820118.zip

  • Size

    50KB

  • Sample

    210513-vvnzd1mb1e

  • MD5

    2613aa93b243ff21130acbd99cd36e8a

  • SHA1

    f71a2ab4b50cd159717d7e5aaba6421cbb67493b

  • SHA256

    3c7c1245a4074e8b743e196f3395c435d7f77d395bd9a860c45f05f331629a24

  • SHA512

    ce71789d71e941107889708d4c897f2eb665d584e1466e6eb9f80a25fa84c3c459fc272e6b8c98907457874bd316f288611ed33aed240b904eae3b7658140482

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://smartpalakatva.com/edQsUZOLlE/th.html

xlm40.dropper

https://pilstlcommodities.com/Ov4FlB3lpy/th.html

Targets

    • Target

      catalog-2005820118.xls

    • Size

      367KB

    • MD5

      29705062863dfd8816d9ea578aab78fd

    • SHA1

      40c270973f51fbba0b4bf1b54b0fe2a5512d2954

    • SHA256

      447579b3f72198ff1cdb35da46c870a10997f4719d7f92bc943cad5018abc5c8

    • SHA512

      9cc415d854b445782da55d18080e8d21e06ae9d74236bfe1993b0417a9fb7eac9d3fa7e1add44dbec3ecb4e76b96df6188f11857d94b826fde9b138b2212c92c

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks