General
-
Target
request_form_1611306935.xlsm
-
Size
16KB
-
Sample
210122-g5fnsx7wn2
-
MD5
5fd958006a94c6145364c06bbf264d06
-
SHA1
d5cc7dc1083508dbe5531db67a3f78866e00330c
-
SHA256
f41c4588d2ef8936d9417069a1c5a44833fb2994c60c54bda14b1aac9aa7b83a
-
SHA512
a8c80661725284a629ec45f25331ea1349f63f4ea8245ae6c6fb62b9e3ac6114889c6b909c34332acd403ac7f0448a1692165b888aa8f7c4fa0ef8fbb404c0d9
Behavioral task
behavioral1
Sample
request_form_1611306935.xlsm
Resource
win7v20201028
Behavioral task
behavioral2
Sample
request_form_1611306935.xlsm
Resource
win10v20201028
Malware Config
Extracted
http://jvdattorney.com/stager/babmboa.php
Targets
-
-
Target
request_form_1611306935.xlsm
-
Size
16KB
-
MD5
5fd958006a94c6145364c06bbf264d06
-
SHA1
d5cc7dc1083508dbe5531db67a3f78866e00330c
-
SHA256
f41c4588d2ef8936d9417069a1c5a44833fb2994c60c54bda14b1aac9aa7b83a
-
SHA512
a8c80661725284a629ec45f25331ea1349f63f4ea8245ae6c6fb62b9e3ac6114889c6b909c34332acd403ac7f0448a1692165b888aa8f7c4fa0ef8fbb404c0d9
Score10/10-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Enumerates physical storage devices
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-