General

  • Target

    864ffc161c8251ad6f9f239f448a152d4b623f8a7ae2b3b0fb6221a0e79441a6.xls

  • Size

    217KB

  • Sample

    221103-w75ncafhcm

  • MD5

    3ec94a1ec5984f01bbfb7a8526cf7f79

  • SHA1

    486ddc839de0ca07bacd4e14ab26a385bc06c2c3

  • SHA256

    864ffc161c8251ad6f9f239f448a152d4b623f8a7ae2b3b0fb6221a0e79441a6

  • SHA512

    a8761233b3be283b786b83cae835945e7a25d0d604cb8716923928627644db6235b35fea3fd16c14dc05163ec305818e856429d9a5023d1cdd3a6f0ab77c6c34

  • SSDEEP

    6144:OKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgIyY+TAQXTHGUMEyP5p6f5jQmL:bbGUMVWlbL

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://aprendeconmireia.com/images/wBu/

xlm40.dropper

http://updailymail.com/cgi-bin/gBYmfqRi2utIS2n/

xlm40.dropper

https://akuntansi.itny.ac.id/asset/9aVFvYeaSKOhGBSLx/

xlm40.dropper

http://swiftwebbox.com/cgi-bin/vNqoMtQilpysJYRwtGu/

Targets

    • Target

      864ffc161c8251ad6f9f239f448a152d4b623f8a7ae2b3b0fb6221a0e79441a6.xls

    • Size

      217KB

    • MD5

      3ec94a1ec5984f01bbfb7a8526cf7f79

    • SHA1

      486ddc839de0ca07bacd4e14ab26a385bc06c2c3

    • SHA256

      864ffc161c8251ad6f9f239f448a152d4b623f8a7ae2b3b0fb6221a0e79441a6

    • SHA512

      a8761233b3be283b786b83cae835945e7a25d0d604cb8716923928627644db6235b35fea3fd16c14dc05163ec305818e856429d9a5023d1cdd3a6f0ab77c6c34

    • SSDEEP

      6144:OKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgIyY+TAQXTHGUMEyP5p6f5jQmL:bbGUMVWlbL

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v6

Tasks