General

  • Target

    752cbe052da065846a55d0d3a4bf0c80519ea1431e67a283722cd8e793a38d20.xls

  • Size

    95KB

  • Sample

    220707-e56desdagj

  • MD5

    50b232ea90c38e855ee7c5d7924d828c

  • SHA1

    4e945a7921bcfc4202265f8680f2a7460ea6a7d6

  • SHA256

    752cbe052da065846a55d0d3a4bf0c80519ea1431e67a283722cd8e793a38d20

  • SHA512

    5a6108fcc1710b73cbd6da95c6222b624f1cecf69405160974838136ecc834a7183fa1bef17b9e08bda658d03e18f8b609ef3806d8ea9176cce7b86f8b6689b5

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://www.sunflowerlaboratory.in/fonts/79Tq62ly/

xlm40.dropper

http://dirigent.co.uk/vardagsekonomi/iC36jJ4J1cf/

xlm40.dropper

http://agtrade.hu/images/kiQYmOs2tSKq/

xlm40.dropper

https://www.zachboyle.com/wp-admin/EA470ZrTGNkuA/

Targets

    • Target

      752cbe052da065846a55d0d3a4bf0c80519ea1431e67a283722cd8e793a38d20.xls

    • Size

      95KB

    • MD5

      50b232ea90c38e855ee7c5d7924d828c

    • SHA1

      4e945a7921bcfc4202265f8680f2a7460ea6a7d6

    • SHA256

      752cbe052da065846a55d0d3a4bf0c80519ea1431e67a283722cd8e793a38d20

    • SHA512

      5a6108fcc1710b73cbd6da95c6222b624f1cecf69405160974838136ecc834a7183fa1bef17b9e08bda658d03e18f8b609ef3806d8ea9176cce7b86f8b6689b5

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks