General

  • Target

    EFT_Payment_Details___113052_-_EFT_Credits.xls

  • Size

    73KB

  • Sample

    211018-ty3raaehcl

  • MD5

    7d8b10b0fdc275fa08e824d83945f633

  • SHA1

    462bef66c0bcd67446ee516f78ada3a6780009bd

  • SHA256

    fc8565740bc47221ef878d70028af6a71f5aaa842b1b29c20977192060635a53

  • SHA512

    8670154713e67f49363eb2e7c34630ceb84814496383645dde3f7b2151d8d19cc62066ac0e8db3eca6d8e759e45981033d91acaca53c1e7c112aaa6c70d850c8

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://thepunchlineexpose.com/Manager/AnyDesk.exe

Targets

    • Target

      EFT_Payment_Details___113052_-_EFT_Credits.xls

    • Size

      73KB

    • MD5

      7d8b10b0fdc275fa08e824d83945f633

    • SHA1

      462bef66c0bcd67446ee516f78ada3a6780009bd

    • SHA256

      fc8565740bc47221ef878d70028af6a71f5aaa842b1b29c20977192060635a53

    • SHA512

      8670154713e67f49363eb2e7c34630ceb84814496383645dde3f7b2151d8d19cc62066ac0e8db3eca6d8e759e45981033d91acaca53c1e7c112aaa6c70d850c8

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks