General

  • Target

    SecuriteInfo.com.XF.AShadow.1205.10577.18568.xlsx

  • Size

    36KB

  • Sample

    230330-3ke8hafh38

  • MD5

    cddadcb2f1e8be946577e547d4b2f511

  • SHA1

    f9db1e42a3a3e35076a371de508136ed167f6ee1

  • SHA256

    346566a4153a1a31a509ebec84a81e0b1659353771ef48801ae6b86afd895da3

  • SHA512

    aab17efba200cc5c75b986f2b71a9750a4ba7b9ec32a0fd6492e50bd3de9abafe9699190733ab3730950132ae3e7c89ad84e5b7876b2aa6452537dee75ba26aa

  • SSDEEP

    768:PPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJus2acPTost9H:nok3hbdlylKsgqopeJBWhZFGkE+cL2N3

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://syracuse.best/wp-data.php

Targets

    • Target

      SecuriteInfo.com.XF.AShadow.1205.10577.18568.xlsx

    • Size

      36KB

    • MD5

      cddadcb2f1e8be946577e547d4b2f511

    • SHA1

      f9db1e42a3a3e35076a371de508136ed167f6ee1

    • SHA256

      346566a4153a1a31a509ebec84a81e0b1659353771ef48801ae6b86afd895da3

    • SHA512

      aab17efba200cc5c75b986f2b71a9750a4ba7b9ec32a0fd6492e50bd3de9abafe9699190733ab3730950132ae3e7c89ad84e5b7876b2aa6452537dee75ba26aa

    • SSDEEP

      768:PPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJus2acPTost9H:nok3hbdlylKsgqopeJBWhZFGkE+cL2N3

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks