General

  • Target

    177617cf62f42e2f132d723597fb4ed407265003307a19d3fd6d5d7a6104eeb7.xls

  • Size

    95KB

  • Sample

    220707-ekyg3scgar

  • MD5

    ca0ef5c3dcc93cd2f5153404eecacd1e

  • SHA1

    04fa28d61366835a5191127e3ad4688c0d6a7ca0

  • SHA256

    177617cf62f42e2f132d723597fb4ed407265003307a19d3fd6d5d7a6104eeb7

  • SHA512

    c49fb782e5c145213375e1a67f865311fb6c13ba5d342ff972733c1f1b79f630a47b6134e5936d485000f69b28e675b556e05c301cca880b877fb99cc3b2de22

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://www.sunflowerlaboratory.in/fonts/79Tq62ly/

xlm40.dropper

http://dirigent.co.uk/vardagsekonomi/iC36jJ4J1cf/

xlm40.dropper

http://agtrade.hu/images/kiQYmOs2tSKq/

xlm40.dropper

https://www.zachboyle.com/wp-admin/EA470ZrTGNkuA/

Targets

    • Target

      177617cf62f42e2f132d723597fb4ed407265003307a19d3fd6d5d7a6104eeb7.xls

    • Size

      95KB

    • MD5

      ca0ef5c3dcc93cd2f5153404eecacd1e

    • SHA1

      04fa28d61366835a5191127e3ad4688c0d6a7ca0

    • SHA256

      177617cf62f42e2f132d723597fb4ed407265003307a19d3fd6d5d7a6104eeb7

    • SHA512

      c49fb782e5c145213375e1a67f865311fb6c13ba5d342ff972733c1f1b79f630a47b6134e5936d485000f69b28e675b556e05c301cca880b877fb99cc3b2de22

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks