General

  • Target

    uhr_90872_R7345655.xlsm

  • Size

    185KB

  • Sample

    210706-w4dksrdxj2

  • MD5

    baea0f9bc6a94b1eafbd2b356ffd6fc9

  • SHA1

    f6d1575abe7189114b01a91002f07332ad05afa9

  • SHA256

    a8000b09f3b22ff8a84435b1de3b79284591638cc18cd7a03d3668c20303119e

  • SHA512

    4c3d4566c109caf04b63a702ce8aaffcfc136141f5efbe5dfec3305013e5671525530888b3bdacd291b25c7f8896201092f6b4ad55e6a7296759e7d6b8ea2626

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://thousandsyears.download/div/44376,8555986111.jpg

xlm40.dropper

http://voopeople.fun/div/44376,8555986111.jpg

xlm40.dropper

http://uppercilio.fun/div/44376,8555986111.jpg

Targets

    • Target

      uhr_90872_R7345655.xlsm

    • Size

      185KB

    • MD5

      baea0f9bc6a94b1eafbd2b356ffd6fc9

    • SHA1

      f6d1575abe7189114b01a91002f07332ad05afa9

    • SHA256

      a8000b09f3b22ff8a84435b1de3b79284591638cc18cd7a03d3668c20303119e

    • SHA512

      4c3d4566c109caf04b63a702ce8aaffcfc136141f5efbe5dfec3305013e5671525530888b3bdacd291b25c7f8896201092f6b4ad55e6a7296759e7d6b8ea2626

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks