General

  • Target

    sviluppo_economico_20__17.xlsb.zip

  • Size

    91KB

  • Sample

    210721-eqr8147kej

  • MD5

    1c55626170ca1e70e35e8dbd653d7c20

  • SHA1

    2af035c622fd260e2f829eea8db16186ab3c0a1d

  • SHA256

    a0442432ffaeb0f8af85315491daa38902c7cec3360e38c237bbab0d0f52eebd

  • SHA512

    28bbedfed4c98c1499aad14808bd46f216acc5bf330482fbf15dffeca5f2b97a004ab4e3e884aca3e36ff1275b5bb5ca7a6fa0e54c0626bc7d3d4d2f2a29b6b4

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://liveswindows.bar/opzi0n1.dll

Targets

    • Target

      sviluppo_economico_20__17.xlsb

    • Size

      108KB

    • MD5

      1d52bc651501078bdc0bb89f03aa103d

    • SHA1

      4d61218c7337d39b403c2e458d3397ed3945a583

    • SHA256

      95b7c86e3bd63fdec0e7261c0c215ff6776aebe34e797f08c7715849a6b6cbe0

    • SHA512

      6af65338767fc624ff5514d236ab60e4298af131a6261ce1ef05ed032ad142caf31b67cb39a843ed04e5d33ee1753f3b200f290dd96a5a18c4e234444432c143

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks