General

  • Target

    2226726056.zip

  • Size

    1.0MB

  • Sample

    220514-rbwcksceel

  • MD5

    37c51435d0650df8eaf040ef8b423e58

  • SHA1

    b2bd5b6f71a74fe937f140208f2363e6a15c897f

  • SHA256

    e2a376d63b1561324cfd9f73d00cbf319a2296a255a18469b82d986f0f323f79

  • SHA512

    b55c8716bbfed0674a3179cf97b21adcd5db096981653273b6df458d1a6e0ee1fe5ee72209c4f84d9aee6a20f26070e3fccfac2d66de3407c2e8ebb604f9e5b7

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://23.227.199.109/44695.667952662.dat

xlm40.dropper

http://77.91.101.69/44695.667952662.dat

xlm40.dropper

http://94.140.114.226/44695.667952662.dat

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://23.227.199.109/44695.6679987269.dat

xlm40.dropper

http://77.91.101.69/44695.6679987269.dat

xlm40.dropper

http://94.140.114.226/44695.6679987269.dat

Targets

    • Target

      2226726056.xlsb

    • Size

      1.0MB

    • MD5

      58e873b384743f67dce82012e7215a99

    • SHA1

      2c89b1b4ec71da38747ce550fdbd3c08da28ca16

    • SHA256

      2ffaa815fc7b7b08d66842936025274d08ddbbd38a8478205fed86ece8848650

    • SHA512

      312b2aeea61ee6c0d10acae9c163095c8ef0f56953f4ad15350eee82023f6ce4612c17f89fb46e37a920e8b260ba3fc54d6d12c20b1d36ef468f99da4742ab71

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks