General

  • Target

    dfa7d3910b9283c3c0705d71e163dcc915fe98aaa9256d83533c2387cc4b5356.xls

  • Size

    95KB

  • Sample

    220707-ebe95sege9

  • MD5

    7e50b46cc1c232a549e79094e2fddea5

  • SHA1

    c78dfe209d833c5954e0987e7b1fa8de60befac9

  • SHA256

    dfa7d3910b9283c3c0705d71e163dcc915fe98aaa9256d83533c2387cc4b5356

  • SHA512

    e1bbfc550b924f9739d45c78ec9fcc40258d312baf7d60560dc5ce8566579c0409110f3d8998455fab9efb981834ac8da00bb26d540cfe2f6150fc2497f7ea86

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://www.sunflowerlaboratory.in/fonts/79Tq62ly/

xlm40.dropper

http://dirigent.co.uk/vardagsekonomi/iC36jJ4J1cf/

xlm40.dropper

http://agtrade.hu/images/kiQYmOs2tSKq/

xlm40.dropper

https://www.zachboyle.com/wp-admin/EA470ZrTGNkuA/

Targets

    • Target

      dfa7d3910b9283c3c0705d71e163dcc915fe98aaa9256d83533c2387cc4b5356.xls

    • Size

      95KB

    • MD5

      7e50b46cc1c232a549e79094e2fddea5

    • SHA1

      c78dfe209d833c5954e0987e7b1fa8de60befac9

    • SHA256

      dfa7d3910b9283c3c0705d71e163dcc915fe98aaa9256d83533c2387cc4b5356

    • SHA512

      e1bbfc550b924f9739d45c78ec9fcc40258d312baf7d60560dc5ce8566579c0409110f3d8998455fab9efb981834ac8da00bb26d540cfe2f6150fc2497f7ea86

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks