General

  • Target

    f2396f2f7c1d0406410daab9b585b2cdd9dedd6f03c1044b58c0b17061760bc9.xls

  • Size

    217KB

  • Sample

    221103-2qkvhaadej

  • MD5

    0d0bc9589d8d36d34c484959fa2c1acc

  • SHA1

    0a1c960f46743864e14b6a0ccf17af6c29bfc054

  • SHA256

    f2396f2f7c1d0406410daab9b585b2cdd9dedd6f03c1044b58c0b17061760bc9

  • SHA512

    46a03463028ce0cf2a4089688ed7560ebbd6a40af448b644ddfc6ab83888baf6b2c31bc7e66b281d8efa7af26daf9941164c29bd7b9562a1583d8d82267e22a1

  • SSDEEP

    6144:zKpb8rGYrMPe3q7Q0XV5xtuEsi8/dglyY+TAQXTHGUMEyP5p6f5jQm7ZnT:1bGUMVWlbJ

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://app.clubdedocentes.com/storage/DCcq9ekgH99sI/

xlm40.dropper

http://linhkiendoc.com/app/payments/qoy5JqpLqrbsKl/

xlm40.dropper

http://sourcecool.com/throng/iOD/

xlm40.dropper

http://www.stickers-et-deco.com/Adapter/lYw/

Targets

    • Target

      f2396f2f7c1d0406410daab9b585b2cdd9dedd6f03c1044b58c0b17061760bc9.xls

    • Size

      217KB

    • MD5

      0d0bc9589d8d36d34c484959fa2c1acc

    • SHA1

      0a1c960f46743864e14b6a0ccf17af6c29bfc054

    • SHA256

      f2396f2f7c1d0406410daab9b585b2cdd9dedd6f03c1044b58c0b17061760bc9

    • SHA512

      46a03463028ce0cf2a4089688ed7560ebbd6a40af448b644ddfc6ab83888baf6b2c31bc7e66b281d8efa7af26daf9941164c29bd7b9562a1583d8d82267e22a1

    • SSDEEP

      6144:zKpb8rGYrMPe3q7Q0XV5xtuEsi8/dglyY+TAQXTHGUMEyP5p6f5jQm7ZnT:1bGUMVWlbJ

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v6

Tasks