General

  • Target

    87c23e951e13b1d01367936aea5a51d70cf76fe1db101dbee612b519af2ce328.xls

  • Size

    95KB

  • Sample

    220707-dg1ycsedd3

  • MD5

    4cfa6f9ee5c1bf3cb072908f89b2738a

  • SHA1

    5322773bb409eab0f52d63f6c5a7c1911adf4271

  • SHA256

    87c23e951e13b1d01367936aea5a51d70cf76fe1db101dbee612b519af2ce328

  • SHA512

    b4505d3630e6c489ce2b913eba47e64c3ff99405f512dde655522eb5637fb167117c940f64683daab2790f3891358981da06bca2c985e849b414c761aa8b5b3b

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

xlm40.dropper

http://earthmach.co.za/libraries/tWkZh9YrXbTd6IeX/

xlm40.dropper

http://finvest.rs/wp-admin/Hr9nVNTIHgw59S/

xlm40.dropper

http://efverstedt.se/5jjaV/w7fLEHJ20xn0qD/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

Targets

    • Target

      87c23e951e13b1d01367936aea5a51d70cf76fe1db101dbee612b519af2ce328.xls

    • Size

      95KB

    • MD5

      4cfa6f9ee5c1bf3cb072908f89b2738a

    • SHA1

      5322773bb409eab0f52d63f6c5a7c1911adf4271

    • SHA256

      87c23e951e13b1d01367936aea5a51d70cf76fe1db101dbee612b519af2ce328

    • SHA512

      b4505d3630e6c489ce2b913eba47e64c3ff99405f512dde655522eb5637fb167117c940f64683daab2790f3891358981da06bca2c985e849b414c761aa8b5b3b

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks