General

  • Target

    40a9c9d58668a1d0d73a144c0b52978e94fb01859927ffbe83acbeb7d13f530d.xls

  • Size

    95KB

  • Sample

    220707-dhtwfaede7

  • MD5

    23fa92d137bcc0ebabd4b4bae26b5969

  • SHA1

    cd7f49a7a54a9e7a21d875a15128fd252a5e9854

  • SHA256

    40a9c9d58668a1d0d73a144c0b52978e94fb01859927ffbe83acbeb7d13f530d

  • SHA512

    0b32be14afd579dc2896ffcf0d121cd9eb7eb8cf6241c33547e6b7e65d68d9258afcbed592cc9c74c59d606c2c95d3a8fb188c1e7752450ad32103699b55c943

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

xlm40.dropper

http://earthmach.co.za/libraries/tWkZh9YrXbTd6IeX/

xlm40.dropper

http://finvest.rs/wp-admin/Hr9nVNTIHgw59S/

xlm40.dropper

http://efverstedt.se/5jjaV/w7fLEHJ20xn0qD/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

Targets

    • Target

      40a9c9d58668a1d0d73a144c0b52978e94fb01859927ffbe83acbeb7d13f530d.xls

    • Size

      95KB

    • MD5

      23fa92d137bcc0ebabd4b4bae26b5969

    • SHA1

      cd7f49a7a54a9e7a21d875a15128fd252a5e9854

    • SHA256

      40a9c9d58668a1d0d73a144c0b52978e94fb01859927ffbe83acbeb7d13f530d

    • SHA512

      0b32be14afd579dc2896ffcf0d121cd9eb7eb8cf6241c33547e6b7e65d68d9258afcbed592cc9c74c59d606c2c95d3a8fb188c1e7752450ad32103699b55c943

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks