General

  • Target

    a54be2c6c2bc406bdfc6c0aa255ce5e9162ea104c20093ef228cefbde186df11.xls

  • Size

    95KB

  • Sample

    220707-ey7b5schgn

  • MD5

    7ae229980e5faf36b0c829f42bf96657

  • SHA1

    4d3cf5c7ac6d25dd4724ab6a9e7c7ad7f53a7abe

  • SHA256

    a54be2c6c2bc406bdfc6c0aa255ce5e9162ea104c20093ef228cefbde186df11

  • SHA512

    cb021dd6bef8d6a3cfa7ce054c5c6df8889931ed9b550d053ee68b132a51fd7d3edee4db2a6d77a183682c4df4521a65d86c78cb921ae84873757e905a14d5cb

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

xlm40.dropper

http://earthmach.co.za/libraries/tWkZh9YrXbTd6IeX/

xlm40.dropper

http://finvest.rs/wp-admin/Hr9nVNTIHgw59S/

xlm40.dropper

http://efverstedt.se/5jjaV/w7fLEHJ20xn0qD/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://edoraseguros.com.br/cgi-bin/jQNq9wlH1GXU/

Targets

    • Target

      a54be2c6c2bc406bdfc6c0aa255ce5e9162ea104c20093ef228cefbde186df11.xls

    • Size

      95KB

    • MD5

      7ae229980e5faf36b0c829f42bf96657

    • SHA1

      4d3cf5c7ac6d25dd4724ab6a9e7c7ad7f53a7abe

    • SHA256

      a54be2c6c2bc406bdfc6c0aa255ce5e9162ea104c20093ef228cefbde186df11

    • SHA512

      cb021dd6bef8d6a3cfa7ce054c5c6df8889931ed9b550d053ee68b132a51fd7d3edee4db2a6d77a183682c4df4521a65d86c78cb921ae84873757e905a14d5cb

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks