General

  • Target

    d8fc61bfe14ab2d7d258d1607e66b4fb5a6a0c6739f444aa3410929f7f36cba4xls.xls

  • Size

    754KB

  • Sample

    231207-yclm4afa22

  • MD5

    8bc3fe969421bddf67f1f915df3780ad

  • SHA1

    337501b622b92528ebcbb80e313b8c34bbdd3fa7

  • SHA256

    d8fc61bfe14ab2d7d258d1607e66b4fb5a6a0c6739f444aa3410929f7f36cba4

  • SHA512

    24dbd3e01df85055e5a7ab6ac1b54cf2f993af2d00683afed8f085642aefd232fdfc2e632b35b69a6b0071712135959b10efb848e20d3adc2fa61116c76604aa

  • SSDEEP

    12288:aoPIj/NtKmSvwtfNsHv38KHa1eYNqscnYwclMZWeVQOgiHviwa4cekHW:PIT6uNsHv3shPcnY5uZN++HKwnAW

Score
10/10

Malware Config

Targets

    • Target

      d8fc61bfe14ab2d7d258d1607e66b4fb5a6a0c6739f444aa3410929f7f36cba4xls.xls

    • Size

      754KB

    • MD5

      8bc3fe969421bddf67f1f915df3780ad

    • SHA1

      337501b622b92528ebcbb80e313b8c34bbdd3fa7

    • SHA256

      d8fc61bfe14ab2d7d258d1607e66b4fb5a6a0c6739f444aa3410929f7f36cba4

    • SHA512

      24dbd3e01df85055e5a7ab6ac1b54cf2f993af2d00683afed8f085642aefd232fdfc2e632b35b69a6b0071712135959b10efb848e20d3adc2fa61116c76604aa

    • SSDEEP

      12288:aoPIj/NtKmSvwtfNsHv38KHa1eYNqscnYwclMZWeVQOgiHviwa4cekHW:PIT6uNsHv3shPcnY5uZN++HKwnAW

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Remote System Discovery

1
T1018

Tasks