General

  • Target

    ab2209aa7777fb912fe4ea1d78ee2f29724b0933dde1f1c57e57de1bdc71c1be.xls

  • Size

    95KB

  • Sample

    220707-dz5n9sefd3

  • MD5

    eb59d0e6038fc2d99f6fa7528781810c

  • SHA1

    891ad8c9957452a380a4e2cadac4e085d894ec4d

  • SHA256

    ab2209aa7777fb912fe4ea1d78ee2f29724b0933dde1f1c57e57de1bdc71c1be

  • SHA512

    6b3cd8d676dfe18747620cb96045a044ded30e9e5151612e26c1b520ce1ce0f3f9ff9feebd66645188d13585ff6c66706496be40262e8d804e44f46ce1a8ac39

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://www.sunflowerlaboratory.in/fonts/79Tq62ly/

xlm40.dropper

http://dirigent.co.uk/vardagsekonomi/iC36jJ4J1cf/

xlm40.dropper

http://agtrade.hu/images/kiQYmOs2tSKq/

xlm40.dropper

https://www.zachboyle.com/wp-admin/EA470ZrTGNkuA/

Targets

    • Target

      ab2209aa7777fb912fe4ea1d78ee2f29724b0933dde1f1c57e57de1bdc71c1be.xls

    • Size

      95KB

    • MD5

      eb59d0e6038fc2d99f6fa7528781810c

    • SHA1

      891ad8c9957452a380a4e2cadac4e085d894ec4d

    • SHA256

      ab2209aa7777fb912fe4ea1d78ee2f29724b0933dde1f1c57e57de1bdc71c1be

    • SHA512

      6b3cd8d676dfe18747620cb96045a044ded30e9e5151612e26c1b520ce1ce0f3f9ff9feebd66645188d13585ff6c66706496be40262e8d804e44f46ce1a8ac39

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks