General

  • Target

    30e1907b405bf3f63ff976bae79b3441066636f04485163c451269203caa0617.xls

  • Size

    95KB

  • Sample

    220707-e1by1sdaaj

  • MD5

    38d3bc828c5cb5f81d9bf026494520a8

  • SHA1

    a1167e1e4fa4469961e21df577c271ef0f572334

  • SHA256

    30e1907b405bf3f63ff976bae79b3441066636f04485163c451269203caa0617

  • SHA512

    7561f58e3e9d7df8258ff4a14e314381962041481edb3cf31fd2d4521c9c716663ed926a2f524e77f561441ba2d4233174d500b30c1d4b8f933eac359ad992fb

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

xlm40.dropper

http://earthmach.co.za/libraries/tWkZh9YrXbTd6IeX/

xlm40.dropper

http://finvest.rs/wp-admin/Hr9nVNTIHgw59S/

xlm40.dropper

http://efverstedt.se/5jjaV/w7fLEHJ20xn0qD/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

Targets

    • Target

      30e1907b405bf3f63ff976bae79b3441066636f04485163c451269203caa0617.xls

    • Size

      95KB

    • MD5

      38d3bc828c5cb5f81d9bf026494520a8

    • SHA1

      a1167e1e4fa4469961e21df577c271ef0f572334

    • SHA256

      30e1907b405bf3f63ff976bae79b3441066636f04485163c451269203caa0617

    • SHA512

      7561f58e3e9d7df8258ff4a14e314381962041481edb3cf31fd2d4521c9c716663ed926a2f524e77f561441ba2d4233174d500b30c1d4b8f933eac359ad992fb

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks