General

  • Target

    ea55294c64b4ada71080913da545f6b84814cd8a5174f67a9e26e49178a20773.xls

  • Size

    95KB

  • Sample

    220707-d5mewacear

  • MD5

    84bf36f3b7c887d042c3cc2cabca43cf

  • SHA1

    8c1620128f9bda4876e503c36fe8c997955669be

  • SHA256

    ea55294c64b4ada71080913da545f6b84814cd8a5174f67a9e26e49178a20773

  • SHA512

    4a448b06f1b12cd691e0ae726b18687e3dc5f5245a7c674eb908d0c718cb544450e9df01328bc66ff86569ba7754aa2b70efcab0ef4128aed2bd7517f6bc5911

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

xlm40.dropper

http://earthmach.co.za/libraries/tWkZh9YrXbTd6IeX/

xlm40.dropper

http://finvest.rs/wp-admin/Hr9nVNTIHgw59S/

xlm40.dropper

http://efverstedt.se/5jjaV/w7fLEHJ20xn0qD/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

Targets

    • Target

      ea55294c64b4ada71080913da545f6b84814cd8a5174f67a9e26e49178a20773.xls

    • Size

      95KB

    • MD5

      84bf36f3b7c887d042c3cc2cabca43cf

    • SHA1

      8c1620128f9bda4876e503c36fe8c997955669be

    • SHA256

      ea55294c64b4ada71080913da545f6b84814cd8a5174f67a9e26e49178a20773

    • SHA512

      4a448b06f1b12cd691e0ae726b18687e3dc5f5245a7c674eb908d0c718cb544450e9df01328bc66ff86569ba7754aa2b70efcab0ef4128aed2bd7517f6bc5911

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks