General

  • Target

    07610eca3a554bbc3279af58afb13d4da4234771cc60b020fac93605a9a8a429.xls

  • Size

    106KB

  • Sample

    220329-zny81afccn

  • MD5

    e51296a26db59c3b953e16f97cefba82

  • SHA1

    9b20e34151eb584eca0bceeab76a0cde75bd3dc2

  • SHA256

    07610eca3a554bbc3279af58afb13d4da4234771cc60b020fac93605a9a8a429

  • SHA512

    cd13887bd34eaea34108b54cf345a50c340e1cfe1953aa3f15433a63d94b66d39ade448e804d392264bb402fc659c2070d5b5b321e8add7bc9eb95b826e0739c

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://fccatinsaat.com/wp-content/Cw3aR6792f/

xlm40.dropper

http://fabulouswebdesign.net/invoice/m/

xlm40.dropper

http://freemanylaluz.com/downloads/8dR9pgNBFtz/

xlm40.dropper

https://freewebsitedirectory.com/wp-includes/v2qFAlMZELRkxbz/

xlm40.dropper

http://futaba.youchien.net/wp-content/sSJqJ/

xlm40.dropper

http://dominionai.org/wp-includes/T5qXAR8p5/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://fccatinsaat.com/wp-content/Cw3aR6792f/

xlm40.dropper

http://fabulouswebdesign.net/invoice/m/

xlm40.dropper

http://freemanylaluz.com/downloads/8dR9pgNBFtz/

xlm40.dropper

https://freewebsitedirectory.com/wp-includes/v2qFAlMZELRkxbz/

Targets

    • Target

      07610eca3a554bbc3279af58afb13d4da4234771cc60b020fac93605a9a8a429.xls

    • Size

      106KB

    • MD5

      e51296a26db59c3b953e16f97cefba82

    • SHA1

      9b20e34151eb584eca0bceeab76a0cde75bd3dc2

    • SHA256

      07610eca3a554bbc3279af58afb13d4da4234771cc60b020fac93605a9a8a429

    • SHA512

      cd13887bd34eaea34108b54cf345a50c340e1cfe1953aa3f15433a63d94b66d39ade448e804d392264bb402fc659c2070d5b5b321e8add7bc9eb95b826e0739c

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks