General

  • Target

    nn30.xlsm

  • Size

    83KB

  • Sample

    220115-mqldpsdhb7

  • MD5

    9636f43534938f7dfa6f9662fca03ff8

  • SHA1

    494885b3781fe4adab15e6738a99555a341b4b82

  • SHA256

    1a243db583013a6999761dad88d6952351fdc2cd17d2016990276a9dd11ac90b

  • SHA512

    e1e9e6832eb13fd3d6f22b22be0f3aeb41b662c4c217dd6f2a841b38b71d2c82cc14dbf97a3167c30be56e9838398870349e12196493a49ca21ab166fe1edd63

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://zml.laneso.com/packet/AlvJ8OdtSYEeeCQP/

xlm40.dropper

http://ostadsarma.com/wp-admin/JNgASjNC/

Targets

    • Target

      nn30.xlsm

    • Size

      83KB

    • MD5

      9636f43534938f7dfa6f9662fca03ff8

    • SHA1

      494885b3781fe4adab15e6738a99555a341b4b82

    • SHA256

      1a243db583013a6999761dad88d6952351fdc2cd17d2016990276a9dd11ac90b

    • SHA512

      e1e9e6832eb13fd3d6f22b22be0f3aeb41b662c4c217dd6f2a841b38b71d2c82cc14dbf97a3167c30be56e9838398870349e12196493a49ca21ab166fe1edd63

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks