General

  • Target

    EABE-642433415.xlsb

  • Size

    233KB

  • Sample

    221005-wvxrzafdbk

  • MD5

    d69f7b13f077bee29b9fc11586821573

  • SHA1

    e947c09c7d94ebffbd72b47c509755b0daf0536e

  • SHA256

    6e99d381255452bde2dd87f658a1a4a3d440141bf832c69c5abe2c963682155a

  • SHA512

    2188d0f1d248d57e9016783e8045f29f8eede481fced622b2b84ab1a93f5c669f5ac6d4114f10ef2e707aaaae137943dec462f108c7eaa74b578fc2d4b4875be

  • SSDEEP

    3072:isRqaz6kqB/EsWcXCJGbtyntvHGiYMnIOwKSIYFUQRLmTDBwszHbcOQafZDK:isw5nRXCw+DnIdFUKmTDBwsz7c1yDK

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://nafenterpriselimited.co.uk/Keeu/0.html

xlm40.dropper

http://metroberrylocalmarketing.com/7z8b/0.html

Targets

    • Target

      EABE-642433415.xlsb

    • Size

      233KB

    • MD5

      d69f7b13f077bee29b9fc11586821573

    • SHA1

      e947c09c7d94ebffbd72b47c509755b0daf0536e

    • SHA256

      6e99d381255452bde2dd87f658a1a4a3d440141bf832c69c5abe2c963682155a

    • SHA512

      2188d0f1d248d57e9016783e8045f29f8eede481fced622b2b84ab1a93f5c669f5ac6d4114f10ef2e707aaaae137943dec462f108c7eaa74b578fc2d4b4875be

    • SSDEEP

      3072:isRqaz6kqB/EsWcXCJGbtyntvHGiYMnIOwKSIYFUQRLmTDBwszHbcOQafZDK:isw5nRXCw+DnIdFUKmTDBwsz7c1yDK

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v6

Tasks