General

  • Target

    0a6306e50db0b660d4a9fd31917b9e4fad611cc900339c958f78024152c2243a.xls

  • Size

    95KB

  • Sample

    220707-e6ks4sdagl

  • MD5

    760ddf2fd70eec2af80259815d7a7cb7

  • SHA1

    c197611467593a271008d65b9c83fb40e3bb9a79

  • SHA256

    0a6306e50db0b660d4a9fd31917b9e4fad611cc900339c958f78024152c2243a

  • SHA512

    2014d24800616eb60d54d1925059f23c7359bbc2bbb853bf91c9e5904a79eb4fd6177afb7c5b64aa10092845e802c8bd71647e0ffbae6050c9423cc3ff857b5a

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://www.sunflowerlaboratory.in/fonts/79Tq62ly/

xlm40.dropper

http://dirigent.co.uk/vardagsekonomi/iC36jJ4J1cf/

xlm40.dropper

http://agtrade.hu/images/kiQYmOs2tSKq/

xlm40.dropper

https://www.zachboyle.com/wp-admin/EA470ZrTGNkuA/

Targets

    • Target

      0a6306e50db0b660d4a9fd31917b9e4fad611cc900339c958f78024152c2243a.xls

    • Size

      95KB

    • MD5

      760ddf2fd70eec2af80259815d7a7cb7

    • SHA1

      c197611467593a271008d65b9c83fb40e3bb9a79

    • SHA256

      0a6306e50db0b660d4a9fd31917b9e4fad611cc900339c958f78024152c2243a

    • SHA512

      2014d24800616eb60d54d1925059f23c7359bbc2bbb853bf91c9e5904a79eb4fd6177afb7c5b64aa10092845e802c8bd71647e0ffbae6050c9423cc3ff857b5a

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks