General

  • Target

    7a34b7338d6059c4fe8f9389a6e346ad52e868477cfd472654a4aef08a968b0f.xls

  • Size

    95KB

  • Sample

    220707-emh56scgcl

  • MD5

    d7d29440f428f4819d093fb11e2a14b8

  • SHA1

    56580dc28a0cfcce5837ec60bc309bdbe62025aa

  • SHA256

    7a34b7338d6059c4fe8f9389a6e346ad52e868477cfd472654a4aef08a968b0f

  • SHA512

    9373543b93e85ea97b7f761d4b01aa4e0e95986694cea9d92466999523b6e7bfc0098abd1d1ca41198c064674576c9a646acf5c6caffcb5092fd97416089ab3e

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://www.sunflowerlaboratory.in/fonts/79Tq62ly/

xlm40.dropper

http://dirigent.co.uk/vardagsekonomi/iC36jJ4J1cf/

xlm40.dropper

http://agtrade.hu/images/kiQYmOs2tSKq/

xlm40.dropper

https://www.zachboyle.com/wp-admin/EA470ZrTGNkuA/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://www.sunflowerlaboratory.in/fonts/79Tq62ly/

xlm40.dropper

http://dirigent.co.uk/vardagsekonomi/iC36jJ4J1cf/

xlm40.dropper

http://agtrade.hu/images/kiQYmOs2tSKq/

Targets

    • Target

      7a34b7338d6059c4fe8f9389a6e346ad52e868477cfd472654a4aef08a968b0f.xls

    • Size

      95KB

    • MD5

      d7d29440f428f4819d093fb11e2a14b8

    • SHA1

      56580dc28a0cfcce5837ec60bc309bdbe62025aa

    • SHA256

      7a34b7338d6059c4fe8f9389a6e346ad52e868477cfd472654a4aef08a968b0f

    • SHA512

      9373543b93e85ea97b7f761d4b01aa4e0e95986694cea9d92466999523b6e7bfc0098abd1d1ca41198c064674576c9a646acf5c6caffcb5092fd97416089ab3e

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks