General

  • Target

    11f99b697bb830bf20b770d88acf606a.xls

  • Size

    35KB

  • Sample

    240101-lntfvsaeh2

  • MD5

    11f99b697bb830bf20b770d88acf606a

  • SHA1

    7409f574a6a46b7cfb9444a55a518aa609a3f1c7

  • SHA256

    f1f89edcdf4f4556d15993a6fd3bae2062133671df1ddd2414ad5c8cfbaba33c

  • SHA512

    90172f932d293240be4aaf97f0c6bc2c88a6a94b3ab04cb13ef7f0850e6b96282ee3733149194e10a728b2c5fdd53b8903be87cbb7b8c374f5bcc71e4abf1de5

  • SSDEEP

    768:jPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJhVJ76KYzu7Mw:7ok3hbdlylKsgqopeJBWhZFGkE+cL2NQ

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://syracuse.best/wp-data.php

Targets

    • Target

      11f99b697bb830bf20b770d88acf606a.xls

    • Size

      35KB

    • MD5

      11f99b697bb830bf20b770d88acf606a

    • SHA1

      7409f574a6a46b7cfb9444a55a518aa609a3f1c7

    • SHA256

      f1f89edcdf4f4556d15993a6fd3bae2062133671df1ddd2414ad5c8cfbaba33c

    • SHA512

      90172f932d293240be4aaf97f0c6bc2c88a6a94b3ab04cb13ef7f0850e6b96282ee3733149194e10a728b2c5fdd53b8903be87cbb7b8c374f5bcc71e4abf1de5

    • SSDEEP

      768:jPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJhVJ76KYzu7Mw:7ok3hbdlylKsgqopeJBWhZFGkE+cL2NQ

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks