General

  • Target

    COVID-19 PALLIATIVES BONUS ON PAGA.xlsx.scr

  • Size

    1.4MB

  • Sample

    200624-lr8a1b7jmn

  • MD5

    c6bed0ae958f524c96ea66abe4388143

  • SHA1

    e004388f83243650ed3dd97564d0ba7461560538

  • SHA256

    690fd66b2d2844fa4bd98c0b1f79fbf7fe9c38c5f187d1ee05757bda9c28984e

  • SHA512

    ea286c26a54ecbfc21507b9128b47646a331c07602b99d87a84166662d32a650bcb5f2c13052304119aa3845566c4bbaa9c8eed47e3aecc17cc6b44851bcf741

Score
7/10

Malware Config

Targets

    • Target

      COVID-19 PALLIATIVES BONUS ON PAGA.xlsx.scr

    • Size

      1.4MB

    • MD5

      c6bed0ae958f524c96ea66abe4388143

    • SHA1

      e004388f83243650ed3dd97564d0ba7461560538

    • SHA256

      690fd66b2d2844fa4bd98c0b1f79fbf7fe9c38c5f187d1ee05757bda9c28984e

    • SHA512

      ea286c26a54ecbfc21507b9128b47646a331c07602b99d87a84166662d32a650bcb5f2c13052304119aa3845566c4bbaa9c8eed47e3aecc17cc6b44851bcf741

    Score
    7/10
    • Drops startup file

    • Adds Run entry to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks