General
-
Target
nn30.xlsm
-
Size
83KB
-
Sample
220115-mqldpsdhb7
-
MD5
9636f43534938f7dfa6f9662fca03ff8
-
SHA1
494885b3781fe4adab15e6738a99555a341b4b82
-
SHA256
1a243db583013a6999761dad88d6952351fdc2cd17d2016990276a9dd11ac90b
-
SHA512
e1e9e6832eb13fd3d6f22b22be0f3aeb41b662c4c217dd6f2a841b38b71d2c82cc14dbf97a3167c30be56e9838398870349e12196493a49ca21ab166fe1edd63
Behavioral task
behavioral1
Sample
nn30.xlsm
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
nn30.xlsm
Resource
win10v2004-en-20220113
Malware Config
Extracted
https://zml.laneso.com/packet/AlvJ8OdtSYEeeCQP/
http://ostadsarma.com/wp-admin/JNgASjNC/
Targets
-
-
Target
nn30.xlsm
-
Size
83KB
-
MD5
9636f43534938f7dfa6f9662fca03ff8
-
SHA1
494885b3781fe4adab15e6738a99555a341b4b82
-
SHA256
1a243db583013a6999761dad88d6952351fdc2cd17d2016990276a9dd11ac90b
-
SHA512
e1e9e6832eb13fd3d6f22b22be0f3aeb41b662c4c217dd6f2a841b38b71d2c82cc14dbf97a3167c30be56e9838398870349e12196493a49ca21ab166fe1edd63
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Drops file in System32 directory
-