General

  • Target

    6fb725ac3a4e123fe7ca68cfc479f169aecb0350376408578a104bf4737ca63a.xls

  • Size

    217KB

  • Sample

    221104-jwa85sdcf7

  • MD5

    d7364535e96ba7bbd7784de171785233

  • SHA1

    b4dc8dcb9e5ee1a6f5d5f3826539541b45efe296

  • SHA256

    6fb725ac3a4e123fe7ca68cfc479f169aecb0350376408578a104bf4737ca63a

  • SHA512

    21b2e75713ecda115c6bb08b4da83868577db3936d6b964745f9d75497241982555e0b058beee8227208093e131f9eb4c53ef01e57cf6874031d553011032ffd

  • SSDEEP

    6144:zKpb8rGYrMPe3q7Q0XV5xtuEsi8/dg3yY+TAQXTHGUMEyP5p6f5jQmw:TbGUMVWlbw

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://wijsneusmedia.nl/cgi-bin/DvxmZndf0/

xlm40.dropper

http://brittknight.com/PHP/Aqxf09OugZ/

xlm40.dropper

http://nlasandbox.com/facebookpage/JFqg2Aqkl3UPZi6xGz/

xlm40.dropper

http://www.campusconindigital.org/moodle/LumMe/

Targets

    • Target

      6fb725ac3a4e123fe7ca68cfc479f169aecb0350376408578a104bf4737ca63a.xls

    • Size

      217KB

    • MD5

      d7364535e96ba7bbd7784de171785233

    • SHA1

      b4dc8dcb9e5ee1a6f5d5f3826539541b45efe296

    • SHA256

      6fb725ac3a4e123fe7ca68cfc479f169aecb0350376408578a104bf4737ca63a

    • SHA512

      21b2e75713ecda115c6bb08b4da83868577db3936d6b964745f9d75497241982555e0b058beee8227208093e131f9eb4c53ef01e57cf6874031d553011032ffd

    • SSDEEP

      6144:zKpb8rGYrMPe3q7Q0XV5xtuEsi8/dg3yY+TAQXTHGUMEyP5p6f5jQmw:TbGUMVWlbw

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v6

Tasks