General

  • Target

    04e2781824c3d087ef66a412fd338bebdef578835006f17be1757767a2f3a3de.xls

  • Size

    95KB

  • Sample

    220707-en3k7scgep

  • MD5

    fa376982a68f5680632619e253c470ff

  • SHA1

    a9d51cb0d8cc75db2bd9a96dcae65114f1dbfbc8

  • SHA256

    04e2781824c3d087ef66a412fd338bebdef578835006f17be1757767a2f3a3de

  • SHA512

    4dd72b93286923439e70a114abc371ab92574efa3e28be8f947f2bebd82f7202c09afaba93f259f537a46d7a7af4b32450a1d5db273deca6d551cb6372f8c9e1

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://www.sunflowerlaboratory.in/fonts/79Tq62ly/

xlm40.dropper

http://dirigent.co.uk/vardagsekonomi/iC36jJ4J1cf/

xlm40.dropper

http://agtrade.hu/images/kiQYmOs2tSKq/

xlm40.dropper

https://www.zachboyle.com/wp-admin/EA470ZrTGNkuA/

Targets

    • Target

      04e2781824c3d087ef66a412fd338bebdef578835006f17be1757767a2f3a3de.xls

    • Size

      95KB

    • MD5

      fa376982a68f5680632619e253c470ff

    • SHA1

      a9d51cb0d8cc75db2bd9a96dcae65114f1dbfbc8

    • SHA256

      04e2781824c3d087ef66a412fd338bebdef578835006f17be1757767a2f3a3de

    • SHA512

      4dd72b93286923439e70a114abc371ab92574efa3e28be8f947f2bebd82f7202c09afaba93f259f537a46d7a7af4b32450a1d5db273deca6d551cb6372f8c9e1

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks