General

  • Target

    e91b0ff5ab4d2c8a1b0fa8a648afcd439f43a53ae181c601b7401b2fe4816b6f.xls

  • Size

    95KB

  • Sample

    220707-e934vsdbbm

  • MD5

    a096354a13cc0bec8872f4f45e7ed157

  • SHA1

    e0e4d5995d9fcd76d00de2581f41cd418ef3316b

  • SHA256

    e91b0ff5ab4d2c8a1b0fa8a648afcd439f43a53ae181c601b7401b2fe4816b6f

  • SHA512

    46ec3b32e43cdbee00538372a0b5ac6fe3870ddaaae2b216f74b4cf850b56550c567a95c93fdfa13fba5fe14a5a8660503f93a032c53089c49901fcfe87e0260

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

xlm40.dropper

http://earthmach.co.za/libraries/tWkZh9YrXbTd6IeX/

xlm40.dropper

http://finvest.rs/wp-admin/Hr9nVNTIHgw59S/

xlm40.dropper

http://efverstedt.se/5jjaV/w7fLEHJ20xn0qD/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

Targets

    • Target

      e91b0ff5ab4d2c8a1b0fa8a648afcd439f43a53ae181c601b7401b2fe4816b6f.xls

    • Size

      95KB

    • MD5

      a096354a13cc0bec8872f4f45e7ed157

    • SHA1

      e0e4d5995d9fcd76d00de2581f41cd418ef3316b

    • SHA256

      e91b0ff5ab4d2c8a1b0fa8a648afcd439f43a53ae181c601b7401b2fe4816b6f

    • SHA512

      46ec3b32e43cdbee00538372a0b5ac6fe3870ddaaae2b216f74b4cf850b56550c567a95c93fdfa13fba5fe14a5a8660503f93a032c53089c49901fcfe87e0260

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks