General

  • Target

    cf0c4ea971c8025ac11b1d4b717b2d1fc8b49a1be5022c83b7c8760c19860474.xls

  • Size

    95KB

  • Sample

    220707-d6wpyacecl

  • MD5

    78b3327e250997f14c9bc3d2e2da9296

  • SHA1

    86c136a72875264266f3e51347514816cdb22de1

  • SHA256

    cf0c4ea971c8025ac11b1d4b717b2d1fc8b49a1be5022c83b7c8760c19860474

  • SHA512

    c3e34e769ba8108a94e6cdd32b1dd8fe552ff1fbafc1fd266fbd0f8b15667ecf695502b3a0fd6c992ae0f72f7758eec9ce95db6413c420482c9e3b005fbfee28

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

xlm40.dropper

http://earthmach.co.za/libraries/tWkZh9YrXbTd6IeX/

xlm40.dropper

http://finvest.rs/wp-admin/Hr9nVNTIHgw59S/

xlm40.dropper

http://efverstedt.se/5jjaV/w7fLEHJ20xn0qD/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

Targets

    • Target

      cf0c4ea971c8025ac11b1d4b717b2d1fc8b49a1be5022c83b7c8760c19860474.xls

    • Size

      95KB

    • MD5

      78b3327e250997f14c9bc3d2e2da9296

    • SHA1

      86c136a72875264266f3e51347514816cdb22de1

    • SHA256

      cf0c4ea971c8025ac11b1d4b717b2d1fc8b49a1be5022c83b7c8760c19860474

    • SHA512

      c3e34e769ba8108a94e6cdd32b1dd8fe552ff1fbafc1fd266fbd0f8b15667ecf695502b3a0fd6c992ae0f72f7758eec9ce95db6413c420482c9e3b005fbfee28

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks