General

  • Target

    236ac6c0eb07ff8eec04c23ea23ca2a344ccb87dc00280228d34f835480942db.xls

  • Size

    95KB

  • Sample

    220707-exgp4afbc4

  • MD5

    ac42c1708ee94a690d026807ac24c107

  • SHA1

    3c4d0944d1fff44975f42a15d442c02cc29f78e9

  • SHA256

    236ac6c0eb07ff8eec04c23ea23ca2a344ccb87dc00280228d34f835480942db

  • SHA512

    fa4377c7467c5fbb9b9d21b66ffd069268ca731bcf11de138dd47df4a2f46f41f99e585ca37b3d4e03512767451d22b094196bf1f6953c871e1de8e89edb8562

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://www.sunflowerlaboratory.in/fonts/79Tq62ly/

xlm40.dropper

http://dirigent.co.uk/vardagsekonomi/iC36jJ4J1cf/

xlm40.dropper

http://agtrade.hu/images/kiQYmOs2tSKq/

xlm40.dropper

https://www.zachboyle.com/wp-admin/EA470ZrTGNkuA/

Targets

    • Target

      236ac6c0eb07ff8eec04c23ea23ca2a344ccb87dc00280228d34f835480942db.xls

    • Size

      95KB

    • MD5

      ac42c1708ee94a690d026807ac24c107

    • SHA1

      3c4d0944d1fff44975f42a15d442c02cc29f78e9

    • SHA256

      236ac6c0eb07ff8eec04c23ea23ca2a344ccb87dc00280228d34f835480942db

    • SHA512

      fa4377c7467c5fbb9b9d21b66ffd069268ca731bcf11de138dd47df4a2f46f41f99e585ca37b3d4e03512767451d22b094196bf1f6953c871e1de8e89edb8562

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks