General

  • Target

    EABE-1892921085.xlsb.xlsx

  • Size

    233KB

  • Sample

    221005-rxelyseeh2

  • MD5

    4f8a3fbbb04355b3671d7bdd0c6b77b3

  • SHA1

    f4475896b8a0e6d6c4d21eb433df2926affccfcc

  • SHA256

    d3788e69dd125449af3d985de93701c49cef0658bc98e3b449185f86cbee027d

  • SHA512

    7b56450eb27a3d7142e72d8a95a4be5a0e5dab8bebce3c4d7727874ac2219e5a2d25835f1943f6d20784d5525eaa83cadacf6ff3708342d42947483156fc083a

  • SSDEEP

    3072:CsRqaz6kqB/EsWcXCJGbtyntvHGiYMnIOwKSIYFUQRLmTDBwszHbcOQafZDK:Csw5nRXCw+DnIdFUKmTDBwsz7c1yDK

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://nafenterpriselimited.co.uk/Keeu/0.html

xlm40.dropper

http://metroberrylocalmarketing.com/7z8b/0.html

Targets

    • Target

      EABE-1892921085.xlsb.xlsx

    • Size

      233KB

    • MD5

      4f8a3fbbb04355b3671d7bdd0c6b77b3

    • SHA1

      f4475896b8a0e6d6c4d21eb433df2926affccfcc

    • SHA256

      d3788e69dd125449af3d985de93701c49cef0658bc98e3b449185f86cbee027d

    • SHA512

      7b56450eb27a3d7142e72d8a95a4be5a0e5dab8bebce3c4d7727874ac2219e5a2d25835f1943f6d20784d5525eaa83cadacf6ff3708342d42947483156fc083a

    • SSDEEP

      3072:CsRqaz6kqB/EsWcXCJGbtyntvHGiYMnIOwKSIYFUQRLmTDBwszHbcOQafZDK:Csw5nRXCw+DnIdFUKmTDBwsz7c1yDK

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks