General

  • Target

    catalog-1873693796.zip

  • Size

    50KB

  • Sample

    210513-w89gzf71ha

  • MD5

    7f794938bd6a6ef89832e9c8d1bf1171

  • SHA1

    6a3832b9e7ddfcb520cd5d43e7f7b222008abe0f

  • SHA256

    8864b5728bc03472dd8e01326b0b9cf2b717ecd77bdfd9daa8daf0013aad3665

  • SHA512

    7049897d075813c904c76a5497c14de7d3087f535e51212ae2347545ecbc18f7879e1d97260a054bc1109167542d491d366e13342180159665452822f101180c

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://smartpalakatva.com/edQsUZOLlE/th.html

xlm40.dropper

https://pilstlcommodities.com/Ov4FlB3lpy/th.html

Targets

    • Target

      catalog-1873693796.xls

    • Size

      367KB

    • MD5

      c5414224e45ec7499d1104fa95bc7300

    • SHA1

      e2c266e749a21225cdf533137537265d45c26c5c

    • SHA256

      b9aa0a0043a0bb65a408172bf51aa97110b03bdc3d83a3bf9f0ef4e634c935ea

    • SHA512

      d44017a83f582c5f5a52e905382b601b7f09a5dc67e4133b2ec8eb9cd0c2b94179fde9c7dda6c0770c0f08ffb4bba99bd4745cd7236733cf89f14ac9cfc96ebe

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks