General

  • Target

    d0ce7b117e4f8d0aa5f0cdd52418b35ef98dc94db16af26dff262217602f8bfb.xls

  • Size

    95KB

  • Sample

    220707-d3ebgscdgr

  • MD5

    4b39f0fd7075212cb456b2b39ba684cd

  • SHA1

    06d0e925443dbc6deecb750892132e7d9b569cb4

  • SHA256

    d0ce7b117e4f8d0aa5f0cdd52418b35ef98dc94db16af26dff262217602f8bfb

  • SHA512

    0d6352cdfa0d84a767aadf54e74846fa68c74d35e451037a4732f4c124d3935253ef15887eb6c415a802a9c74f0839be42193500e80b33d446d1e0565206a4f5

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

xlm40.dropper

http://earthmach.co.za/libraries/tWkZh9YrXbTd6IeX/

xlm40.dropper

http://finvest.rs/wp-admin/Hr9nVNTIHgw59S/

xlm40.dropper

http://efverstedt.se/5jjaV/w7fLEHJ20xn0qD/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

Targets

    • Target

      d0ce7b117e4f8d0aa5f0cdd52418b35ef98dc94db16af26dff262217602f8bfb.xls

    • Size

      95KB

    • MD5

      4b39f0fd7075212cb456b2b39ba684cd

    • SHA1

      06d0e925443dbc6deecb750892132e7d9b569cb4

    • SHA256

      d0ce7b117e4f8d0aa5f0cdd52418b35ef98dc94db16af26dff262217602f8bfb

    • SHA512

      0d6352cdfa0d84a767aadf54e74846fa68c74d35e451037a4732f4c124d3935253ef15887eb6c415a802a9c74f0839be42193500e80b33d446d1e0565206a4f5

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks