General

  • Target

    Readme.xlsm

  • Size

    11KB

  • Sample

    210721-srcdfl8n8n

  • MD5

    25f485e0ef7ee4ad57dcf6b31349acc7

  • SHA1

    3a24b3e770b146665f218080808269267727cd43

  • SHA256

    34f1a9c906fc08849f9c7d85edfa9915b46516a0708d2835f7a19ba9e5a1b386

  • SHA512

    54f1c10527d0a81bed803aa3949cad4a124379087ac4dc02d029e0736f9540488408e8f44469fdf8d124e2bab2b9d08af1eefcb139101abb5aedf8066a4e91c7

Score
10/10

Malware Config

Targets

    • Target

      Readme.xlsm

    • Size

      11KB

    • MD5

      25f485e0ef7ee4ad57dcf6b31349acc7

    • SHA1

      3a24b3e770b146665f218080808269267727cd43

    • SHA256

      34f1a9c906fc08849f9c7d85edfa9915b46516a0708d2835f7a19ba9e5a1b386

    • SHA512

      54f1c10527d0a81bed803aa3949cad4a124379087ac4dc02d029e0736f9540488408e8f44469fdf8d124e2bab2b9d08af1eefcb139101abb5aedf8066a4e91c7

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks