General

  • Target

    d86405130184186154daa4a5132dd1364ab05d1f14034c7f0a0cda690a91116d.xlsx

  • Size

    105KB

  • Sample

    240418-cjr8kagc82

  • MD5

    e7c614f4eb6aa532c189c76d87a8862b

  • SHA1

    191eda0c539d284b29efe556abb05cd75a9077a0

  • SHA256

    d86405130184186154daa4a5132dd1364ab05d1f14034c7f0a0cda690a91116d

  • SHA512

    1ab9b883f1e57bcda44657797bc543f995a30a66ea4a57891518c0ff455ff527d3a7c50bddd69e2365a651a2918623b9b02b5143da15389489f5f2a3d97107fe

  • SSDEEP

    3072:e2CxNFcWr5qQDzPjEwqtDpko+bJ99K7meX7pD/:ezxjYDj+d9imeX7pD/

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://metaflip.io/ds/3003.gif

xlm40.dropper

https://partsapp.com.br/ds/3003.gif

xlm40.dropper

https://columbia.aula-web.net/ds/3003.gif

xlm40.dropper

https://tajushariya.com/ds/3003.gif

xlm40.dropper

https://agenbolatermurah.com/ds/3003.gif

Targets

    • Target

      d86405130184186154daa4a5132dd1364ab05d1f14034c7f0a0cda690a91116d.xlsx

    • Size

      105KB

    • MD5

      e7c614f4eb6aa532c189c76d87a8862b

    • SHA1

      191eda0c539d284b29efe556abb05cd75a9077a0

    • SHA256

      d86405130184186154daa4a5132dd1364ab05d1f14034c7f0a0cda690a91116d

    • SHA512

      1ab9b883f1e57bcda44657797bc543f995a30a66ea4a57891518c0ff455ff527d3a7c50bddd69e2365a651a2918623b9b02b5143da15389489f5f2a3d97107fe

    • SSDEEP

      3072:e2CxNFcWr5qQDzPjEwqtDpko+bJ99K7meX7pD/:ezxjYDj+d9imeX7pD/

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks