General

  • Target

    0696ba2b378ea784531cf5e02c227d719c3ba79544e535bd9a380e636aab6fd2.xls

  • Size

    95KB

  • Sample

    220707-da9xpaece7

  • MD5

    943d414e2d09b91a1f78593dd3c061cd

  • SHA1

    6ee2b17dd5ef5f1b2a363c9e62297f84f2f90302

  • SHA256

    0696ba2b378ea784531cf5e02c227d719c3ba79544e535bd9a380e636aab6fd2

  • SHA512

    b67a2da9b8669cafd38c6b52ba09b4af0fc5e453189ba53f967f42dd66d0c1ea5f83e5da6e2b6c0c44afbfc6e0fa00da3627088b97e8da72f85e9b9697183a79

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://www.sunflowerlaboratory.in/fonts/79Tq62ly/

xlm40.dropper

http://dirigent.co.uk/vardagsekonomi/iC36jJ4J1cf/

xlm40.dropper

http://agtrade.hu/images/kiQYmOs2tSKq/

xlm40.dropper

https://www.zachboyle.com/wp-admin/EA470ZrTGNkuA/

Targets

    • Target

      0696ba2b378ea784531cf5e02c227d719c3ba79544e535bd9a380e636aab6fd2.xls

    • Size

      95KB

    • MD5

      943d414e2d09b91a1f78593dd3c061cd

    • SHA1

      6ee2b17dd5ef5f1b2a363c9e62297f84f2f90302

    • SHA256

      0696ba2b378ea784531cf5e02c227d719c3ba79544e535bd9a380e636aab6fd2

    • SHA512

      b67a2da9b8669cafd38c6b52ba09b4af0fc5e453189ba53f967f42dd66d0c1ea5f83e5da6e2b6c0c44afbfc6e0fa00da3627088b97e8da72f85e9b9697183a79

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks