General

  • Target

    Reciept 96285898.xlsb

  • Size

    134KB

  • Sample

    210702-281f56zlhn

  • MD5

    c32e8a076a3dd64e30cd8b5c5a7a2276

  • SHA1

    17b52997cf29214e7b06368269879237c09e7706

  • SHA256

    709e2a3846cb20034181c4bb090b6d98499955d850970b87d49e3271184e2d8f

  • SHA512

    d0a9295cdfb26fe2ee61767515ce279f5bc2c5529903875a76a7d3503215a1875c1dc1b177ce7c0031bd6bb2de6ad36ab4722dcf445bdc0e8184783636b44c50

Score
9/10

Malware Config

Targets

    • Target

      Reciept 96285898.xlsb

    • Size

      134KB

    • MD5

      c32e8a076a3dd64e30cd8b5c5a7a2276

    • SHA1

      17b52997cf29214e7b06368269879237c09e7706

    • SHA256

      709e2a3846cb20034181c4bb090b6d98499955d850970b87d49e3271184e2d8f

    • SHA512

      d0a9295cdfb26fe2ee61767515ce279f5bc2c5529903875a76a7d3503215a1875c1dc1b177ce7c0031bd6bb2de6ad36ab4722dcf445bdc0e8184783636b44c50

    Score
    9/10
    • CryptOne packer

      Detects CryptOne packer defined in NCC blogpost.

    • Blocklisted process makes network request

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks