General

  • Target

    6MxvY1yp_hyx49p.zip

  • Size

    2.2MB

  • Sample

    220131-1xpxcsdba3

  • MD5

    cf28ce0e870daa10e4e21a2f5ebd9e32

  • SHA1

    4dc6b579f3c5bef639d5ac33b70bb06b638288a0

  • SHA256

    9add27b1b3662450783504fd95ad604580ce05070fd2d869f0d0ffc0e4c08aaf

  • SHA512

    0329b5052c2efd444b13081b334c4edd4110faf9d214eb4a87639680717a48813ea456d4850bbab19a91050721e01b6ab54a3cacfe98b3d9edf6c3218daadb9d

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      document[2022.01.31_15-32].xll

    • Size

      5.5MB

    • MD5

      70828862c70defaa1247cbf982baa581

    • SHA1

      d790adf35b62424622b37e9a8f6f7ad18f6103ec

    • SHA256

      f1382d5cab7ee309b2a97cb31400fd30909c3b5789a3981081feec2788083edd

    • SHA512

      faa6f6f9ced8a7415cb53766d2d0a5339952c0805ca100b971ba1852678149f10ffa1e72776b8937cae02347c56150f37a060d4bba3c575c75ad5c4233142471

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Sets service image path in registry

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks