General

  • Target

    74e71137617fdfb20a525df4a76dd95fc0d630a8ea930cf9287ec29e183d0585.xls

  • Size

    217KB

  • Sample

    221103-2xgfnaaebr

  • MD5

    4b6abed86c2bea68614ec1d7a9008e0e

  • SHA1

    3d60491343341fb063fa7cddf6d2f48402a4d4d5

  • SHA256

    74e71137617fdfb20a525df4a76dd95fc0d630a8ea930cf9287ec29e183d0585

  • SHA512

    3c6b8cec72f5ced62509ab051cb1b0ef6b0eec6c972905547a209071ceae90dd0247099669f508051308a75fe8bae097c2f2a783cf5ec64ca1c9f240e2d4c8dd

  • SSDEEP

    6144:zKpb8rGYrMPe3q7Q0XV5xtuEsi8/dglyY+TAQXTHGUMEyP5p6f5jQm7VnT:1bGUMVWlbd

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://app.clubdedocentes.com/storage/DCcq9ekgH99sI/

xlm40.dropper

http://linhkiendoc.com/app/payments/qoy5JqpLqrbsKl/

xlm40.dropper

http://sourcecool.com/throng/iOD/

xlm40.dropper

http://www.stickers-et-deco.com/Adapter/lYw/

Targets

    • Target

      74e71137617fdfb20a525df4a76dd95fc0d630a8ea930cf9287ec29e183d0585.xls

    • Size

      217KB

    • MD5

      4b6abed86c2bea68614ec1d7a9008e0e

    • SHA1

      3d60491343341fb063fa7cddf6d2f48402a4d4d5

    • SHA256

      74e71137617fdfb20a525df4a76dd95fc0d630a8ea930cf9287ec29e183d0585

    • SHA512

      3c6b8cec72f5ced62509ab051cb1b0ef6b0eec6c972905547a209071ceae90dd0247099669f508051308a75fe8bae097c2f2a783cf5ec64ca1c9f240e2d4c8dd

    • SSDEEP

      6144:zKpb8rGYrMPe3q7Q0XV5xtuEsi8/dglyY+TAQXTHGUMEyP5p6f5jQm7VnT:1bGUMVWlbd

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v6

Tasks