General

  • Target

    8417df5243616b3555ae82394cec26ac2003b7b53e070f2be5dd4dadb8c40d18.xls

  • Size

    95KB

  • Sample

    220707-dv8kcseeh7

  • MD5

    35e1f17737d61aa140aa9a15df46bc8e

  • SHA1

    410711d5e0ac28e59a465b4dbe84ebc9ed9d7b09

  • SHA256

    8417df5243616b3555ae82394cec26ac2003b7b53e070f2be5dd4dadb8c40d18

  • SHA512

    e0483e95b81a7c605655bb7e9878f82bd1707bcaaf397506b599d054f449260643c6f2683112efe0d30208ca739bc4176895df5298608124f954d43d62f126f9

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

xlm40.dropper

http://earthmach.co.za/libraries/tWkZh9YrXbTd6IeX/

xlm40.dropper

http://finvest.rs/wp-admin/Hr9nVNTIHgw59S/

xlm40.dropper

http://efverstedt.se/5jjaV/w7fLEHJ20xn0qD/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

Targets

    • Target

      8417df5243616b3555ae82394cec26ac2003b7b53e070f2be5dd4dadb8c40d18.xls

    • Size

      95KB

    • MD5

      35e1f17737d61aa140aa9a15df46bc8e

    • SHA1

      410711d5e0ac28e59a465b4dbe84ebc9ed9d7b09

    • SHA256

      8417df5243616b3555ae82394cec26ac2003b7b53e070f2be5dd4dadb8c40d18

    • SHA512

      e0483e95b81a7c605655bb7e9878f82bd1707bcaaf397506b599d054f449260643c6f2683112efe0d30208ca739bc4176895df5298608124f954d43d62f126f9

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks