Resubmissions

14-07-2021 19:15

210714-kbf8zkt3qa 10

14-07-2021 12:29

210714-nbf5bw46ce 10

General

  • Target

    dbt_ntf_1184293.xlsm

  • Size

    84KB

  • Sample

    210714-kbf8zkt3qa

  • MD5

    afdd3ac1e245c015cd6703ac38f6cc06

  • SHA1

    6c5daf1541d2b05f5d6c99c2bc5a9bcff23688cf

  • SHA256

    0846910f2f2c0c686afab342cbb79965a115b35e41a0381819a0d10461d45c77

  • SHA512

    6c65d2a616397ed5645af8bb4a16dcadaaf9efa86d22b64509bad873eeb6086d7e9129eeee516f2d321771815b326dd858da7f13ad32721ce496cfc0d24300f3

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://162.248.225.89/m1.dll

Targets

    • Target

      dbt_ntf_1184293.xlsm

    • Size

      84KB

    • MD5

      afdd3ac1e245c015cd6703ac38f6cc06

    • SHA1

      6c5daf1541d2b05f5d6c99c2bc5a9bcff23688cf

    • SHA256

      0846910f2f2c0c686afab342cbb79965a115b35e41a0381819a0d10461d45c77

    • SHA512

      6c65d2a616397ed5645af8bb4a16dcadaaf9efa86d22b64509bad873eeb6086d7e9129eeee516f2d321771815b326dd858da7f13ad32721ce496cfc0d24300f3

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks