General

  • Target

    6f135fdddf732d3ae8b06a3e00edc3073503695bf7d1c165f5db96e982265bf3.xls

  • Size

    95KB

  • Sample

    220707-emh56sfaa7

  • MD5

    53cdccb8915a1314cda3843e78a9acaa

  • SHA1

    16ff127872b4625c714a4ede672a593e9938f30b

  • SHA256

    6f135fdddf732d3ae8b06a3e00edc3073503695bf7d1c165f5db96e982265bf3

  • SHA512

    42f9feb3e38f3aed56e02ee127cf57e43e1a1441ec567e9620130c59e8b40dbe77f6bf11398c3ed32b95fa9f8f347b19715bdee4a375bd056902d610be2c7ed5

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

xlm40.dropper

http://earthmach.co.za/libraries/tWkZh9YrXbTd6IeX/

xlm40.dropper

http://finvest.rs/wp-admin/Hr9nVNTIHgw59S/

xlm40.dropper

http://efverstedt.se/5jjaV/w7fLEHJ20xn0qD/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

Targets

    • Target

      6f135fdddf732d3ae8b06a3e00edc3073503695bf7d1c165f5db96e982265bf3.xls

    • Size

      95KB

    • MD5

      53cdccb8915a1314cda3843e78a9acaa

    • SHA1

      16ff127872b4625c714a4ede672a593e9938f30b

    • SHA256

      6f135fdddf732d3ae8b06a3e00edc3073503695bf7d1c165f5db96e982265bf3

    • SHA512

      42f9feb3e38f3aed56e02ee127cf57e43e1a1441ec567e9620130c59e8b40dbe77f6bf11398c3ed32b95fa9f8f347b19715bdee4a375bd056902d610be2c7ed5

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks