General

  • Target

    2337c3667a271a55df0750f7027eba8391275912fd35e041668f9f900d5e9d8c.xls

  • Size

    95KB

  • Sample

    220707-edmr1acfbn

  • MD5

    6f55dce504818776e232fe987f848e1e

  • SHA1

    df7d7185dbc1757ebae6ccebeb389b6e49684093

  • SHA256

    2337c3667a271a55df0750f7027eba8391275912fd35e041668f9f900d5e9d8c

  • SHA512

    bb83f4aab4dcac3d5aefe7bd603b0c3262c69e01ea477a03d67d4c7c78d1ed9463a45062d041f225482edde100122e1ceb984fee89af962ebb11e560c990e871

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

xlm40.dropper

http://earthmach.co.za/libraries/tWkZh9YrXbTd6IeX/

xlm40.dropper

http://finvest.rs/wp-admin/Hr9nVNTIHgw59S/

xlm40.dropper

http://efverstedt.se/5jjaV/w7fLEHJ20xn0qD/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

Targets

    • Target

      2337c3667a271a55df0750f7027eba8391275912fd35e041668f9f900d5e9d8c.xls

    • Size

      95KB

    • MD5

      6f55dce504818776e232fe987f848e1e

    • SHA1

      df7d7185dbc1757ebae6ccebeb389b6e49684093

    • SHA256

      2337c3667a271a55df0750f7027eba8391275912fd35e041668f9f900d5e9d8c

    • SHA512

      bb83f4aab4dcac3d5aefe7bd603b0c3262c69e01ea477a03d67d4c7c78d1ed9463a45062d041f225482edde100122e1ceb984fee89af962ebb11e560c990e871

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks