General

  • Target

    5ab049b4cd81fba59e194535ddc11a677fa64809b86967138c370d026009e523

  • Size

    80KB

  • Sample

    220521-m8vp4adcd2

  • MD5

    5f081285b1fbfa8bceb3898b666c8a22

  • SHA1

    b9c9872695d820c8ba16f22cb3989820f8ea46a5

  • SHA256

    5ab049b4cd81fba59e194535ddc11a677fa64809b86967138c370d026009e523

  • SHA512

    4dffbdeebe6c24b501d1604a98bf34b2fb8f8a7e17927e6ab03dbb454cf16d569c2e701d4e563653f473061f11ade4a25d3949cf4b06268b4e72c1565e4faa36

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://link.rolandchase.com/setup.exe

Targets

    • Target

      utente_5372.xls

    • Size

      182KB

    • MD5

      d2dd670679bf058c5f1d54698c06a1ae

    • SHA1

      78da270912f7caf709bfe33b7b11f26c0b1c8b32

    • SHA256

      a5b085ab8fb0c399b94ee37ecd7770c3c54b41f5f3c430da6fae572c6c39f7bd

    • SHA512

      fdc6a3fddf55efe011fc7f6bb839ca43db9c521b91cb87ce7d95473938f23eda7543e07c3240cb42f90223f28e725ddf844a7f87077372d87a7dad44494c2f20

    Score
    10/10
    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Tasks