General

  • Target

    a59d849db620a9c459cf9a203dc391a918b1c822141bdf9d0b7d6cfabc1b4353.xls

  • Size

    95KB

  • Sample

    220707-dvcspaeeg7

  • MD5

    1e74b93bf30c2d9fb47ddc30685c27af

  • SHA1

    b01fc24f9e50cd1d666c81a6e6c08d40c63e7bbd

  • SHA256

    a59d849db620a9c459cf9a203dc391a918b1c822141bdf9d0b7d6cfabc1b4353

  • SHA512

    6eef429301cac2971fd0c9bc19f5a974b9194f2e1c5531c9947d5eed0cd350f070ffc4062b3ff761def6ad6dc9ea0e85f5f8ce786de25b175225ddc411a2ecfe

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

xlm40.dropper

http://earthmach.co.za/libraries/tWkZh9YrXbTd6IeX/

xlm40.dropper

http://finvest.rs/wp-admin/Hr9nVNTIHgw59S/

xlm40.dropper

http://efverstedt.se/5jjaV/w7fLEHJ20xn0qD/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

Targets

    • Target

      a59d849db620a9c459cf9a203dc391a918b1c822141bdf9d0b7d6cfabc1b4353.xls

    • Size

      95KB

    • MD5

      1e74b93bf30c2d9fb47ddc30685c27af

    • SHA1

      b01fc24f9e50cd1d666c81a6e6c08d40c63e7bbd

    • SHA256

      a59d849db620a9c459cf9a203dc391a918b1c822141bdf9d0b7d6cfabc1b4353

    • SHA512

      6eef429301cac2971fd0c9bc19f5a974b9194f2e1c5531c9947d5eed0cd350f070ffc4062b3ff761def6ad6dc9ea0e85f5f8ce786de25b175225ddc411a2ecfe

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks