General

  • Target

    57653e49a63db6dabe929e42431ded8fb23e8fc19c4a3c0132bf295acaa74ab2.xls

  • Size

    95KB

  • Sample

    220707-egbtxacfep

  • MD5

    2bc17473aea1d29adc0b7c03c215db8c

  • SHA1

    50327a6fe9ed5bc152692e7fe2e35fd53c3e1c39

  • SHA256

    57653e49a63db6dabe929e42431ded8fb23e8fc19c4a3c0132bf295acaa74ab2

  • SHA512

    6d3a2dbabf995614cda38bb8a2e5a6e631bc6fc3f03230401d393bc01d0dd870f607578b440fe00558c887dddd7738be80efc6f28af0443f54b5a58e9f903fad

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

xlm40.dropper

http://earthmach.co.za/libraries/tWkZh9YrXbTd6IeX/

xlm40.dropper

http://finvest.rs/wp-admin/Hr9nVNTIHgw59S/

xlm40.dropper

http://efverstedt.se/5jjaV/w7fLEHJ20xn0qD/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

Targets

    • Target

      57653e49a63db6dabe929e42431ded8fb23e8fc19c4a3c0132bf295acaa74ab2.xls

    • Size

      95KB

    • MD5

      2bc17473aea1d29adc0b7c03c215db8c

    • SHA1

      50327a6fe9ed5bc152692e7fe2e35fd53c3e1c39

    • SHA256

      57653e49a63db6dabe929e42431ded8fb23e8fc19c4a3c0132bf295acaa74ab2

    • SHA512

      6d3a2dbabf995614cda38bb8a2e5a6e631bc6fc3f03230401d393bc01d0dd870f607578b440fe00558c887dddd7738be80efc6f28af0443f54b5a58e9f903fad

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks