General

  • Target

    NUEVO PEDIDO - AM0004.xlam.xlsx

  • Size

    635KB

  • Sample

    231007-janbksca93

  • MD5

    76b8e770e43a86225100af1d6c453db4

  • SHA1

    4d26cba976150a545fdc69952fe6313882de2534

  • SHA256

    807a4939c263c7dac20c558e287011049b23dc998c3dcbf8efb897b25b3bcf26

  • SHA512

    f1017081dd07eb06fd05d6a74ded64882eacfbe64f707c640765fdc9f5098b880cdfee351d1bf0e79888aaa9adb269c9e2bfbf44d44175d702bb31b1db453440

  • SSDEEP

    12288:15i06UfOHz1KSEW/z4vIArAVtUL2ThnvHkhyqgwsgU1jJB9NzsWhxI+9C:fUdEWEvIAkML2TRHkZlEb/Nzs/iC

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://uploaddeimagens.com.br/images/004/616/609/original/rump_vbs.jpg?1695408937

exe.dropper

https://uploaddeimagens.com.br/images/004/616/609/original/rump_vbs.jpg?1695408937

Targets

    • Target

      NUEVO PEDIDO - AM0004.xlam.xlsx

    • Size

      635KB

    • MD5

      76b8e770e43a86225100af1d6c453db4

    • SHA1

      4d26cba976150a545fdc69952fe6313882de2534

    • SHA256

      807a4939c263c7dac20c558e287011049b23dc998c3dcbf8efb897b25b3bcf26

    • SHA512

      f1017081dd07eb06fd05d6a74ded64882eacfbe64f707c640765fdc9f5098b880cdfee351d1bf0e79888aaa9adb269c9e2bfbf44d44175d702bb31b1db453440

    • SSDEEP

      12288:15i06UfOHz1KSEW/z4vIArAVtUL2ThnvHkhyqgwsgU1jJB9NzsWhxI+9C:fUdEWEvIAkML2TRHkZlEb/Nzs/iC

    Score
    10/10
    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks