General

  • Target

    transact_details_031399515.xlsb

  • Size

    61KB

  • Sample

    210610-75l47vensn

  • MD5

    ac4f72de702d20fa91a780026f409325

  • SHA1

    1f5f84efac222661cbc466878e3ddcdfe76e8234

  • SHA256

    69f93b8727e96fa3ea824c7893c28e9f94ce39e4de3c10537b479856a33b2fa7

  • SHA512

    f66f78d6bc413e798ecce1999d8c85caa9e1727a97443f751a44be4efb9a077e4c60908291ab8909374de5af5ac2cd7c07c7f0f6c388d69ad7b86ef3aaa1d439

Score
10/10

Malware Config

Targets

    • Target

      transact_details_031399515.xlsb

    • Size

      61KB

    • MD5

      ac4f72de702d20fa91a780026f409325

    • SHA1

      1f5f84efac222661cbc466878e3ddcdfe76e8234

    • SHA256

      69f93b8727e96fa3ea824c7893c28e9f94ce39e4de3c10537b479856a33b2fa7

    • SHA512

      f66f78d6bc413e798ecce1999d8c85caa9e1727a97443f751a44be4efb9a077e4c60908291ab8909374de5af5ac2cd7c07c7f0f6c388d69ad7b86ef3aaa1d439

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks