General

  • Target

    e23d49bc52000f614ca7341ba08820cb2cb1ceedfdd5d801aceb0f8ec571c21b.xls

  • Size

    217KB

  • Sample

    221103-2hk6asgbe8

  • MD5

    bf5251f430e7efe6f4228ad44655da35

  • SHA1

    99e5a450cf8d70c80eb42b9d440dcc3fa176ff0e

  • SHA256

    e23d49bc52000f614ca7341ba08820cb2cb1ceedfdd5d801aceb0f8ec571c21b

  • SHA512

    ae67615296776add0fd56ea66ca5013045235fb95feea766f532000b0b4cce467bce46b46c7ea27a4272bd156f031263a226d785fc40ff1081b41554c6c50a15

  • SSDEEP

    6144:zKpb8rGYrMPe3q7Q0XV5xtuEsi8/dglyY+TAQXTHGUMEyP5p6f5jQm7ZnT:1bGUMVWlbJ

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://app.clubdedocentes.com/storage/DCcq9ekgH99sI/

xlm40.dropper

http://linhkiendoc.com/app/payments/qoy5JqpLqrbsKl/

xlm40.dropper

http://sourcecool.com/throng/iOD/

xlm40.dropper

http://www.stickers-et-deco.com/Adapter/lYw/

Targets

    • Target

      e23d49bc52000f614ca7341ba08820cb2cb1ceedfdd5d801aceb0f8ec571c21b.xls

    • Size

      217KB

    • MD5

      bf5251f430e7efe6f4228ad44655da35

    • SHA1

      99e5a450cf8d70c80eb42b9d440dcc3fa176ff0e

    • SHA256

      e23d49bc52000f614ca7341ba08820cb2cb1ceedfdd5d801aceb0f8ec571c21b

    • SHA512

      ae67615296776add0fd56ea66ca5013045235fb95feea766f532000b0b4cce467bce46b46c7ea27a4272bd156f031263a226d785fc40ff1081b41554c6c50a15

    • SSDEEP

      6144:zKpb8rGYrMPe3q7Q0XV5xtuEsi8/dglyY+TAQXTHGUMEyP5p6f5jQm7ZnT:1bGUMVWlbJ

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v6

Tasks