General

  • Target

    9ac37fad7bc6a599ffcb58074c03bf18df001af0d726f258a7170d94a698e7b7.xls

  • Size

    95KB

  • Sample

    220707-e8ysradbal

  • MD5

    74e578bf43b6ae034ad2fe062c10d808

  • SHA1

    fc241881f510be06d593174045767023ff63bdd2

  • SHA256

    9ac37fad7bc6a599ffcb58074c03bf18df001af0d726f258a7170d94a698e7b7

  • SHA512

    ae5fe83195ecfc2be4aa7b8ce797ed92d55ea241969432f000ba7d21453ba8eae86bcbdc2e529069b4ea40e4d51f1e56ebc0e36e9351bd699fdfffa1747241a2

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

xlm40.dropper

http://earthmach.co.za/libraries/tWkZh9YrXbTd6IeX/

xlm40.dropper

http://finvest.rs/wp-admin/Hr9nVNTIHgw59S/

xlm40.dropper

http://efverstedt.se/5jjaV/w7fLEHJ20xn0qD/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

Targets

    • Target

      9ac37fad7bc6a599ffcb58074c03bf18df001af0d726f258a7170d94a698e7b7.xls

    • Size

      95KB

    • MD5

      74e578bf43b6ae034ad2fe062c10d808

    • SHA1

      fc241881f510be06d593174045767023ff63bdd2

    • SHA256

      9ac37fad7bc6a599ffcb58074c03bf18df001af0d726f258a7170d94a698e7b7

    • SHA512

      ae5fe83195ecfc2be4aa7b8ce797ed92d55ea241969432f000ba7d21453ba8eae86bcbdc2e529069b4ea40e4d51f1e56ebc0e36e9351bd699fdfffa1747241a2

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks