General

  • Target

    01ec5990d62346ccf4edf1d13e60d2d9492e349a9b672eaf44bf1671ed7a3be5.xls

  • Size

    95KB

  • Sample

    220707-exgebschep

  • MD5

    6af98ed100795eaa218b681fd6ceb901

  • SHA1

    a587aa71e853e0730c50f5cd7e762d3ed76eaaa6

  • SHA256

    01ec5990d62346ccf4edf1d13e60d2d9492e349a9b672eaf44bf1671ed7a3be5

  • SHA512

    03a73f0e1486e593b4a667a8fb0b1440b2b491df9462ed6614f58429ba61f14379b35964b341fa786c357f7fd735dc58441b3aee31fe065f0151e3f2780a76be

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://www.sunflowerlaboratory.in/fonts/79Tq62ly/

xlm40.dropper

http://dirigent.co.uk/vardagsekonomi/iC36jJ4J1cf/

xlm40.dropper

http://agtrade.hu/images/kiQYmOs2tSKq/

xlm40.dropper

https://www.zachboyle.com/wp-admin/EA470ZrTGNkuA/

Targets

    • Target

      01ec5990d62346ccf4edf1d13e60d2d9492e349a9b672eaf44bf1671ed7a3be5.xls

    • Size

      95KB

    • MD5

      6af98ed100795eaa218b681fd6ceb901

    • SHA1

      a587aa71e853e0730c50f5cd7e762d3ed76eaaa6

    • SHA256

      01ec5990d62346ccf4edf1d13e60d2d9492e349a9b672eaf44bf1671ed7a3be5

    • SHA512

      03a73f0e1486e593b4a667a8fb0b1440b2b491df9462ed6614f58429ba61f14379b35964b341fa786c357f7fd735dc58441b3aee31fe065f0151e3f2780a76be

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks