General

  • Target

    catalog-291206972.zip

  • Size

    50KB

  • Sample

    210513-y4xyh4nwgn

  • MD5

    a139ed7676ed79090bd79551e7456272

  • SHA1

    7ea748c399df1d5ec5dcfcf4fd2f351da75ec819

  • SHA256

    abc62cd45f49e2a363fc97e4a813ea03fa006d4063652b9e06bd41dfb621ddd3

  • SHA512

    5b5f56cb7924f49634e65b057d81023b927b7dbb52f46734fa03b6f3434b3e80b5da604ee652b49c35ddadd2e0c775df5cdd8e43cbf3554578e82bd5df849271

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://smartpalakatva.com/edQsUZOLlE/th.html

xlm40.dropper

https://pilstlcommodities.com/Ov4FlB3lpy/th.html

Targets

    • Target

      catalog-291206972.xls

    • Size

      367KB

    • MD5

      2ace7f812b812a87db109c09ebdb1b58

    • SHA1

      b6240850c6bd9eed17f936d8c4a950e09afe83c5

    • SHA256

      b5ce168b00c7cf58cad2a9b4f21b1025710dd6921d908f40c7cabd77de877e11

    • SHA512

      3fcfcb979ad0306283e59b9d0970d4d1cd3d7f6d31209a8982c0bfe80d483d774438ec7b638b459d273a8a143cbbd6478ae7c426c759e85222748e47b10c06b1

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks