General

  • Target

    6f8c75b8a325800b3df1bc1a2c061a63b6ae8251c7a2a9627b9d2a02308fbe4c.xls

  • Size

    95KB

  • Sample

    220707-d6wd6sega5

  • MD5

    30e115f54246fb2e3eb6d700398a88aa

  • SHA1

    51926ea9c48378825fd40f08f1a9f19ae818d580

  • SHA256

    6f8c75b8a325800b3df1bc1a2c061a63b6ae8251c7a2a9627b9d2a02308fbe4c

  • SHA512

    0061cc6f4d6a94416424dfda512cec06658fecce311b2db287d4e1d13e2e8224c61ee28053b0b556794db378e0a1a13488ac9e3ded93678ff11d4490d8ba391b

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://www.sunflowerlaboratory.in/fonts/79Tq62ly/

xlm40.dropper

http://dirigent.co.uk/vardagsekonomi/iC36jJ4J1cf/

xlm40.dropper

http://agtrade.hu/images/kiQYmOs2tSKq/

xlm40.dropper

https://www.zachboyle.com/wp-admin/EA470ZrTGNkuA/

Targets

    • Target

      6f8c75b8a325800b3df1bc1a2c061a63b6ae8251c7a2a9627b9d2a02308fbe4c.xls

    • Size

      95KB

    • MD5

      30e115f54246fb2e3eb6d700398a88aa

    • SHA1

      51926ea9c48378825fd40f08f1a9f19ae818d580

    • SHA256

      6f8c75b8a325800b3df1bc1a2c061a63b6ae8251c7a2a9627b9d2a02308fbe4c

    • SHA512

      0061cc6f4d6a94416424dfda512cec06658fecce311b2db287d4e1d13e2e8224c61ee28053b0b556794db378e0a1a13488ac9e3ded93678ff11d4490d8ba391b

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks