General

  • Target

    84b15f6162160b4d1307664e279aaad2d2599d210d8e6c14244f8b81d6dd90c5.xls

  • Size

    95KB

  • Sample

    220707-dj7tpaedf9

  • MD5

    2d3cbb7bc483e4b299213d91f9663786

  • SHA1

    6806b668c160065edd674f90e0b5c77e2a24f642

  • SHA256

    84b15f6162160b4d1307664e279aaad2d2599d210d8e6c14244f8b81d6dd90c5

  • SHA512

    41891505957d2d07b1f9da5363896098af44b55c00b39844ea01581ce2b21a656f6fae75ec4b517750a581b2ebf6db8f20b498465e8ca3a4a41af11038329e78

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

xlm40.dropper

http://earthmach.co.za/libraries/tWkZh9YrXbTd6IeX/

xlm40.dropper

http://finvest.rs/wp-admin/Hr9nVNTIHgw59S/

xlm40.dropper

http://efverstedt.se/5jjaV/w7fLEHJ20xn0qD/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

Targets

    • Target

      84b15f6162160b4d1307664e279aaad2d2599d210d8e6c14244f8b81d6dd90c5.xls

    • Size

      95KB

    • MD5

      2d3cbb7bc483e4b299213d91f9663786

    • SHA1

      6806b668c160065edd674f90e0b5c77e2a24f642

    • SHA256

      84b15f6162160b4d1307664e279aaad2d2599d210d8e6c14244f8b81d6dd90c5

    • SHA512

      41891505957d2d07b1f9da5363896098af44b55c00b39844ea01581ce2b21a656f6fae75ec4b517750a581b2ebf6db8f20b498465e8ca3a4a41af11038329e78

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks