General

  • Target

    EABE-376707214.xlsb.xlsx

  • Size

    233KB

  • Sample

    221005-t9darsfben

  • MD5

    6c2cf252183a10fd423a7112ff51414a

  • SHA1

    d9e7368bbb71d812ec3962e7f646b996678f19e4

  • SHA256

    09829068923a0ae7f9d1ce129806436aa62d70f51896f69b642971e55c857ee3

  • SHA512

    53274f4a1e569c8de1f6795962329ac97d8da0b848782cd640174a26bdd2f1968b8436b2d452592244d7a6863070943b0118b08a4076f107bb405f814253a7b9

  • SSDEEP

    3072:KsRqaz6kqB/EsWcXCJGbtyntvHGiYMnIOwKSIYFUQRLmTDBwszHbcOQafZDK:Ksw5nRXCw+DnIdFUKmTDBwsz7c1yDK

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://nafenterpriselimited.co.uk/Keeu/0.html

xlm40.dropper

http://metroberrylocalmarketing.com/7z8b/0.html

Targets

    • Target

      EABE-376707214.xlsb.xlsx

    • Size

      233KB

    • MD5

      6c2cf252183a10fd423a7112ff51414a

    • SHA1

      d9e7368bbb71d812ec3962e7f646b996678f19e4

    • SHA256

      09829068923a0ae7f9d1ce129806436aa62d70f51896f69b642971e55c857ee3

    • SHA512

      53274f4a1e569c8de1f6795962329ac97d8da0b848782cd640174a26bdd2f1968b8436b2d452592244d7a6863070943b0118b08a4076f107bb405f814253a7b9

    • SSDEEP

      3072:KsRqaz6kqB/EsWcXCJGbtyntvHGiYMnIOwKSIYFUQRLmTDBwszHbcOQafZDK:Ksw5nRXCw+DnIdFUKmTDBwsz7c1yDK

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v6

Tasks