General

  • Target

    Booking Confirmation.xlsx

  • Size

    1.2MB

  • Sample

    210720-31xlevxnkn

  • MD5

    7705b3b2ec5ad61d89fe00e255986b09

  • SHA1

    1433685823d14ea88e3878225fc9833e1e34ceab

  • SHA256

    c81bd43d5985cb37be7dc8d4375c2e6ab8998f3962c185a3997d71aba79cf23b

  • SHA512

    79536d40c44f68ea44bcc5aaba7e855fe512c3c36a06ffecbf03fa7234363732751499d8bbfcf6272fe7db8e4b4cecdee46dbfba60f6cea844342eaf8951434d

Score
10/10

Malware Config

Targets

    • Target

      Booking Confirmation.xlsx

    • Size

      1.2MB

    • MD5

      7705b3b2ec5ad61d89fe00e255986b09

    • SHA1

      1433685823d14ea88e3878225fc9833e1e34ceab

    • SHA256

      c81bd43d5985cb37be7dc8d4375c2e6ab8998f3962c185a3997d71aba79cf23b

    • SHA512

      79536d40c44f68ea44bcc5aaba7e855fe512c3c36a06ffecbf03fa7234363732751499d8bbfcf6272fe7db8e4b4cecdee46dbfba60f6cea844342eaf8951434d

    Score
    10/10
    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks