General

  • Target

    38f5da89a1995b071b6cf94fddea9ab34cf689640cf5b25854ce51552e4e91ec.xls

  • Size

    95KB

  • Sample

    220707-e2tv8adacm

  • MD5

    2169c8c4560eeec82620201d1aae5dac

  • SHA1

    b269c13aecc3fec066a2c77213f259d94fc9e3b7

  • SHA256

    38f5da89a1995b071b6cf94fddea9ab34cf689640cf5b25854ce51552e4e91ec

  • SHA512

    43a5144bae8da36e6afbff3fb20d6fc1256e4f60d383583f585a063eb7d3700d6d37f03ffd007f53c8bb8a71d1aef3b12b5865fcb703c45ed22fde0bec0886ae

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

xlm40.dropper

http://earthmach.co.za/libraries/tWkZh9YrXbTd6IeX/

xlm40.dropper

http://finvest.rs/wp-admin/Hr9nVNTIHgw59S/

xlm40.dropper

http://efverstedt.se/5jjaV/w7fLEHJ20xn0qD/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

xlm40.dropper

http://earthmach.co.za/libraries/tWkZh9YrXbTd6IeX/

Targets

    • Target

      38f5da89a1995b071b6cf94fddea9ab34cf689640cf5b25854ce51552e4e91ec.xls

    • Size

      95KB

    • MD5

      2169c8c4560eeec82620201d1aae5dac

    • SHA1

      b269c13aecc3fec066a2c77213f259d94fc9e3b7

    • SHA256

      38f5da89a1995b071b6cf94fddea9ab34cf689640cf5b25854ce51552e4e91ec

    • SHA512

      43a5144bae8da36e6afbff3fb20d6fc1256e4f60d383583f585a063eb7d3700d6d37f03ffd007f53c8bb8a71d1aef3b12b5865fcb703c45ed22fde0bec0886ae

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks