General

  • Target

    purch_details_7683561.xlsm

  • Size

    118KB

  • Sample

    210716-5hydax4j66

  • MD5

    4adb1c704a4a80ecb81c64a434668532

  • SHA1

    2062f59fffc47e4e9bcd54617e41e5cbca9299f2

  • SHA256

    42e23ef70fd55982c25ce5bd3a21d8442fe1412693c578c6a27c6d852570ea82

  • SHA512

    1a22f35118c728f91a59889c54bef878ff4f4d04f82abb926415ee8730618e9f0ef83dc70f52d579b8b4157bca380b8a23ef3e1a0a34569950ff363a4d8b6862

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://162.248.225.95/d.php

Targets

    • Target

      purch_details_7683561.xlsm

    • Size

      118KB

    • MD5

      4adb1c704a4a80ecb81c64a434668532

    • SHA1

      2062f59fffc47e4e9bcd54617e41e5cbca9299f2

    • SHA256

      42e23ef70fd55982c25ce5bd3a21d8442fe1412693c578c6a27c6d852570ea82

    • SHA512

      1a22f35118c728f91a59889c54bef878ff4f4d04f82abb926415ee8730618e9f0ef83dc70f52d579b8b4157bca380b8a23ef3e1a0a34569950ff363a4d8b6862

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks