General

  • Target

    PO 45335543 and VGEITONAS & SIA EE.xlam.xlsx

  • Size

    656KB

  • Sample

    231011-kpfeyscb7w

  • MD5

    2005ee2dd249595725c3ea0389f303bf

  • SHA1

    100c86f353491aeb43e18aae0466701009895ac3

  • SHA256

    2263dfcc53f99feb7f0f88f8a3fe3174eb899159399ac989fc4f00684e716da0

  • SHA512

    573efcbbfe1bb84ff0e4988a0cbc95975ad584c42c4441d836978319fe387c4c56bd8a5c6f2c3c64b4665a931990d0d19d7d0fb578155c9db9a0dd1ba7f49a1b

  • SSDEEP

    12288:ZWv7+tRD0fIdSMg7/1A7eXKdv9wDbfAT7KiO2BaLWcjfCfr8yEDD:5tRD0fIdCA6a4DbfAvKihBaCcjqf3EDD

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://uploaddeimagens.com.br/images/004/616/609/original/rump_vbs.jpg?1695408937

exe.dropper

https://uploaddeimagens.com.br/images/004/616/609/original/rump_vbs.jpg?1695408937

Targets

    • Target

      PO 45335543 and VGEITONAS & SIA EE.xlam.xlsx

    • Size

      656KB

    • MD5

      2005ee2dd249595725c3ea0389f303bf

    • SHA1

      100c86f353491aeb43e18aae0466701009895ac3

    • SHA256

      2263dfcc53f99feb7f0f88f8a3fe3174eb899159399ac989fc4f00684e716da0

    • SHA512

      573efcbbfe1bb84ff0e4988a0cbc95975ad584c42c4441d836978319fe387c4c56bd8a5c6f2c3c64b4665a931990d0d19d7d0fb578155c9db9a0dd1ba7f49a1b

    • SSDEEP

      12288:ZWv7+tRD0fIdSMg7/1A7eXKdv9wDbfAT7KiO2BaLWcjfCfr8yEDD:5tRD0fIdCA6a4DbfAvKihBaCcjqf3EDD

    Score
    10/10
    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks