General

  • Target

    SecuriteInfo.com.XF.AShadow.1000.21414.4259.xlsx

  • Size

    36KB

  • Sample

    230330-3jtz9sfh33

  • MD5

    3f57a4bc544d99554cc22bf2830d382f

  • SHA1

    e8b44bdc89d0d01711674e8d29fa2b1c0854d013

  • SHA256

    b91b0dd75b082180cbe8635b05a98410233831b5faae5168aee8f9299b5484fd

  • SHA512

    7753bcf2d7b3591034dd8cc943b1478c34f99693ac1a3e704d3e2a676b73a57c74cbc26f047783a68a83e0ba7890c25df5c0a14e5bc91bce5a4e0e8cbd06f968

  • SSDEEP

    768:0PqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJ273+1pPcLHCT+3v0Lg+:wok3hbdlylKsgqopeJBWhZFGkE+cL2NY

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://markens.online/wp-data.php

xlm40.dropper

https://statedauto.com/wp-data.php

Targets

    • Target

      SecuriteInfo.com.XF.AShadow.1000.21414.4259.xlsx

    • Size

      36KB

    • MD5

      3f57a4bc544d99554cc22bf2830d382f

    • SHA1

      e8b44bdc89d0d01711674e8d29fa2b1c0854d013

    • SHA256

      b91b0dd75b082180cbe8635b05a98410233831b5faae5168aee8f9299b5484fd

    • SHA512

      7753bcf2d7b3591034dd8cc943b1478c34f99693ac1a3e704d3e2a676b73a57c74cbc26f047783a68a83e0ba7890c25df5c0a14e5bc91bce5a4e0e8cbd06f968

    • SSDEEP

      768:0PqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJ273+1pPcLHCT+3v0Lg+:wok3hbdlylKsgqopeJBWhZFGkE+cL2NY

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks