General

  • Target

    148c7f4fab3837bf3ea8d723a8a1683d79fa72884b2954d3cc35d1b92d811c41.xls

  • Size

    95KB

  • Sample

    220707-ec8yvacfbk

  • MD5

    f2017c36472e9a21fd2819d0c801db8e

  • SHA1

    57487f6dd6b528ec8d12ca18b5704c8dfbde9ca5

  • SHA256

    148c7f4fab3837bf3ea8d723a8a1683d79fa72884b2954d3cc35d1b92d811c41

  • SHA512

    0f6899b04093008924b314117fbd281d64a7af80d5c0bc066d633e31a4256eaef43b4af9d3e4a2748dad9ffb481a6842488bbdc649001a2cdf4e224f4dd53cba

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://www.sunflowerlaboratory.in/fonts/79Tq62ly/

xlm40.dropper

http://dirigent.co.uk/vardagsekonomi/iC36jJ4J1cf/

xlm40.dropper

http://agtrade.hu/images/kiQYmOs2tSKq/

xlm40.dropper

https://www.zachboyle.com/wp-admin/EA470ZrTGNkuA/

Targets

    • Target

      148c7f4fab3837bf3ea8d723a8a1683d79fa72884b2954d3cc35d1b92d811c41.xls

    • Size

      95KB

    • MD5

      f2017c36472e9a21fd2819d0c801db8e

    • SHA1

      57487f6dd6b528ec8d12ca18b5704c8dfbde9ca5

    • SHA256

      148c7f4fab3837bf3ea8d723a8a1683d79fa72884b2954d3cc35d1b92d811c41

    • SHA512

      0f6899b04093008924b314117fbd281d64a7af80d5c0bc066d633e31a4256eaef43b4af9d3e4a2748dad9ffb481a6842488bbdc649001a2cdf4e224f4dd53cba

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks