General

  • Target

    attendees.xlsm.bin

  • Size

    535KB

  • Sample

    241005-lvkgjasgqh

  • MD5

    b556307e1e6462a9aea5dc1f76667d10

  • SHA1

    e3525ffd85d51a0a502012492ed1ef54d22eec88

  • SHA256

    804e3a6cde4114e76fa911b699891535c8ed8b637ee9eaad373619e3ce36ee19

  • SHA512

    51666a80ae3ae2ba69954f47e36521ce08cece8dd258498a7cf88e6c2586fa9a66776c78d68538bca5568965ebca87e9d04ce79db2c2388716ab73182af7164b

  • SSDEEP

    12288:E9ijex0VbLbGeH+59SjrPImbT4XXO8RGNQpRtL8PZY4krmStNpc:E9fKVbLte52rPImbCjGWpj8BYVmSt/c

Malware Config

Targets

    • Target

      attendees.xlsm.bin

    • Size

      535KB

    • MD5

      b556307e1e6462a9aea5dc1f76667d10

    • SHA1

      e3525ffd85d51a0a502012492ed1ef54d22eec88

    • SHA256

      804e3a6cde4114e76fa911b699891535c8ed8b637ee9eaad373619e3ce36ee19

    • SHA512

      51666a80ae3ae2ba69954f47e36521ce08cece8dd258498a7cf88e6c2586fa9a66776c78d68538bca5568965ebca87e9d04ce79db2c2388716ab73182af7164b

    • SSDEEP

      12288:E9ijex0VbLbGeH+59SjrPImbT4XXO8RGNQpRtL8PZY4krmStNpc:E9fKVbLte52rPImbCjGWpj8BYVmSt/c

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • Templ.dll packer

      Detects Templ.dll packer which usually loads Trickbot.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks