General

  • Target

    c0d0fd5f07516d25ab2a3a4b0b797a306afbb9b64e5e942b7df578ea43ee0677.xls

  • Size

    95KB

  • Sample

    220707-dg185aedd4

  • MD5

    903505c389b0771e9f99ccc1f29117c4

  • SHA1

    5f5800091cb786fbb043945c7d7972b428c5f10a

  • SHA256

    c0d0fd5f07516d25ab2a3a4b0b797a306afbb9b64e5e942b7df578ea43ee0677

  • SHA512

    9f6c8aa8d99a4961bcd4fe994240b48c99c54c86dbb4f3a51ae2ecafed65c839d17d469d8d5568fe41b211e8ea626cacb1bed73066e8b97ba79b01ff8fd4cfe7

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://www.sunflowerlaboratory.in/fonts/79Tq62ly/

xlm40.dropper

http://dirigent.co.uk/vardagsekonomi/iC36jJ4J1cf/

xlm40.dropper

http://agtrade.hu/images/kiQYmOs2tSKq/

xlm40.dropper

https://www.zachboyle.com/wp-admin/EA470ZrTGNkuA/

Targets

    • Target

      c0d0fd5f07516d25ab2a3a4b0b797a306afbb9b64e5e942b7df578ea43ee0677.xls

    • Size

      95KB

    • MD5

      903505c389b0771e9f99ccc1f29117c4

    • SHA1

      5f5800091cb786fbb043945c7d7972b428c5f10a

    • SHA256

      c0d0fd5f07516d25ab2a3a4b0b797a306afbb9b64e5e942b7df578ea43ee0677

    • SHA512

      9f6c8aa8d99a4961bcd4fe994240b48c99c54c86dbb4f3a51ae2ecafed65c839d17d469d8d5568fe41b211e8ea626cacb1bed73066e8b97ba79b01ff8fd4cfe7

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks