General

  • Target

    d1b96cd803dc7ac7daeb7554dadf69542979c3d7a65cfa07fb5fec8dafb5623e.xls

  • Size

    86KB

  • Sample

    221201-hbsf9acf43

  • MD5

    352b509a254d2e67c14117a3d8eecd3c

  • SHA1

    ca607e6504eefbe03e85d5fb727f328568b8ac77

  • SHA256

    d1b96cd803dc7ac7daeb7554dadf69542979c3d7a65cfa07fb5fec8dafb5623e

  • SHA512

    a9c9cb8f2746fcd144090f5fa15f752030983203ada3619f20e5ff8b21d6388a4e3df6c1c7261052de1149305546cccaf2d0c2af17a1f6e9a27dadc22e013679

  • SSDEEP

    1536:8fcKoSsxz1PDZLDZjlbR868O8Kfc03V7uDphYHceXVhca+fMHLtyeGx2zZ8dIOii:8fcKoSsxzNDZLDZjlbR868O8Kfc03V74

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://qab26utxb02pquc.com/fera/frid.gif

Targets

    • Target

      d1b96cd803dc7ac7daeb7554dadf69542979c3d7a65cfa07fb5fec8dafb5623e.xls

    • Size

      86KB

    • MD5

      352b509a254d2e67c14117a3d8eecd3c

    • SHA1

      ca607e6504eefbe03e85d5fb727f328568b8ac77

    • SHA256

      d1b96cd803dc7ac7daeb7554dadf69542979c3d7a65cfa07fb5fec8dafb5623e

    • SHA512

      a9c9cb8f2746fcd144090f5fa15f752030983203ada3619f20e5ff8b21d6388a4e3df6c1c7261052de1149305546cccaf2d0c2af17a1f6e9a27dadc22e013679

    • SSDEEP

      1536:8fcKoSsxz1PDZLDZjlbR868O8Kfc03V7uDphYHceXVhca+fMHLtyeGx2zZ8dIOii:8fcKoSsxzNDZLDZjlbR868O8Kfc03V74

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks